-
1
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, reality for delivering computing as the 5th utility
-
June
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, Reality for Delivering Computing as the 5th Utility," Future Gen. Comput. Syst., Vol. 25, No. 6, pp. 599-616, June 2009.
-
(2009)
Future Gen. Comput. Syst.
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
2
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Commun. ACM, Vol. 53, No. 4, pp. 50-58, Apr. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
84906219911
-
-
Sydney, accessed on: March 25, 2013. [Online]
-
Customer Presentations on Amazon Summit Australia, Sydney, 2012, accessed on: March 25, 2013. [Online]. Available: http://aws.amazon.com/apac/awssummit- au/.
-
(2012)
Customer Presentations on Amazon Summit Australia
-
-
-
4
-
-
77954947470
-
Trust store: Making Amazon S3 trustworthy with services composition
-
J. Yao, S. Chen, S. Nepal, D. Levy, and J. Zic, "Trust Store: Making Amazon S3 Trustworthy With Services Composition," in Proc. 10th IEEE/ACM Int'l Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2010, pp. 600-605.
-
(2010)
Proc. 10th IEEE/ACM Int'l Symposium on Cluster, Cloud and Grid Computing (CCGRID)
, pp. 600-605
-
-
Yao, J.1
Chen, S.2
Nepal, S.3
Levy, D.4
Zic, J.5
-
5
-
-
79959557055
-
Addressing cloud computing security issues
-
Mar.
-
D. Zissis and D. Lekkas, "Addressing Cloud Computing Security Issues," Future Gen. Comput. Syst., Vol. 28, No. 3, pp. 583-592, Mar. 2011.
-
(2011)
Future Gen. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
6
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel Distrib. Syst., Vol. 22, No. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
7
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in Proc. 30st IEEE Conf. on Comput. and Commun. (INFOCOM), 2010, pp. 1-9.
-
(2010)
Proc. 30st IEEE Conf. on Comput. and Commun. (INFOCOM)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
8
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," in Proc. 4th Int'l Conf. Security and Privacy in Commun. Netw. (SecureComm), 2008, pp. 1-10.
-
(2008)
Proc. 4th Int'l Conf. Security and Privacy in Commun. Netw. (SecureComm)
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
9
-
-
79959823910
-
Remote data checking using provable data possession
-
May, Article 12
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Trans. Inf. Syst. Security, Vol. 14, No. 1, May 2011, Article 12.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
10
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R.B. Johns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), 2007, pp. 598-609.
-
(2007)
Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS)
, pp. 598-609
-
-
Ateniese, G.1
Johns, R.B.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
11
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R.C. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," in Proc. 28th IEEE Conf. on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.
-
(2008)
Proc. 28th IEEE Conf. on Distrib. Comput. Syst. (ICDCS)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.C.3
Ateniese, G.4
-
12
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS), 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS)
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
13
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
Dec.
-
Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage," IEEE Trans. Parallel Distrib. Syst., Vol. 23, No. 12, pp. 2231-2244, Dec. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
-
16
-
-
80053145892
-
DIaaS: Data integrity as a service in the cloud
-
S. Nepal, S. Chen, J. Yao, and D. Thilakanathan, "DIaaS: Data Integrity as a Service in the Cloud," in Proc. 4th Int'l Conf. on Cloud Computing (IEEE CLOUD), 2011, pp. 308-315.
-
(2011)
Proc. 4th Int'l Conf. on Cloud Computing (IEEE CLOUD)
, pp. 308-315
-
-
Nepal, S.1
Chen, S.2
Yao, J.3
Thilakanathan, D.4
-
17
-
-
79957817790
-
Preventing equivalence attacks in updated, anonymized data
-
Y. He, S. Barman, and J.F. Naughton, "Preventing Equivalence Attacks in Updated, Anonymized Data," in Proc. 27th IEEE Int'l Conf. on Data Engineering (ICDE), 2011, pp. 529-540.
-
(2011)
Proc. 27th IEEE Int'l Conf. on Data Engineering (ICDE)
, pp. 529-540
-
-
He, Y.1
Barman, S.2
Naughton, J.F.3
-
18
-
-
84906253609
-
What twitter learns from all those tweets
-
Sept., accessed on: March 25, 2013. [Online]
-
E. Naone, "What Twitter Learns From All Those Tweets," in Technology Review, Sept. 2010, accessed on: March 25, 2013. [Online]. Available: http://www.technologyreview.com/view/420968/what-twitter-learns-from-all-those- tweets/
-
(2010)
Technology Review
-
-
Naone, E.1
-
19
-
-
84891751231
-
A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud
-
Feb.
-
X. Zhang, L.T. Yang, C. Liu, and J. Chen, "A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud," IEEE Trans. Parallel Distrib. Syst., Vol. 25, No. 2, pp. 363-373, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 363-373
-
-
Zhang, X.1
Yang, L.T.2
Liu, C.3
Chen, J.4
-
20
-
-
84906268524
-
Security and privacy in the AWS cloud
-
Sydney, Australia, May, accessed on: March 25, 2013. [Online]
-
S.E. Schmidt, "Security and Privacy in the AWS Cloud," presented at the Presentation Amazon Summit Australia, Sydney, Australia, May 2012, accessed on: March 25, 2013. [Online]. Available: http://aws.amazon.com/ apac/awssummit-au/.
-
(2012)
Presented at the Presentation Amazon Summit Australia
-
-
Schmidt, S.E.1
-
21
-
-
84864347393
-
CCBKEV session key negotiation for fast and secure scheduling of scientific applications in cloud computing
-
July
-
C. Liu, X. Zhang, C. Yang, and J. Chen, "CCBKEV Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing," Future Gen. Comput. Syst., Vol. 29, No. 5, pp. 1300-1308, July 2013.
-
(2013)
Future Gen. Comput. Syst.
, vol.29
, Issue.5
, pp. 1300-1308
-
-
Liu, C.1
Zhang, X.2
Yang, C.3
Chen, J.4
-
22
-
-
84877786158
-
A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud
-
June
-
X. Zhang, C. Liu, S. Nepal, S. Panley, and J. Chen, "A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud," IEEE Trans. Parallel Distrib. Syst., Vol. 24, No. 6, pp. 1192-1202, June 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1192-1202
-
-
Zhang, X.1
Liu, C.2
Nepal, S.3
Panley, S.4
Chen, J.5
-
23
-
-
23044435711
-
Short signatures from the weil pairing
-
DOI 10.1007/s00145-004-0314-9
-
D. Boneh, H. Shacham, and B. Lynn, "Short Signatures From the Weil Pairing," J. Cryptol., Vol. 17, No. 4, pp. 297-319, Sept. 2004. (Pubitemid 41201461)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage From Homomorphic Identification Protocols," in Proc. 15th Int'l Conf. on Theory and Appl. of Cryptol. and Inf. Security (ASIACRYPT), 2009, pp. 319-333.
-
(2009)
Proc. 15th Int'l Conf. on Theory and Appl. of Cryptol. and Inf. Security (ASIACRYPT)
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
26
-
-
84906227965
-
-
accessed on: March 25, [Online]
-
KVM Hypervisor, accessed on: March 25, 2013. [Online]. Available: www.linux-kvm.org/.
-
(2013)
KVM Hypervisor
-
-
-
27
-
-
84870597499
-
-
[Online]
-
Hadoop MapReduce. [Online]. Available: http://hadoop. apache.org
-
Hadoop MapReduce
-
-
-
28
-
-
84906273338
-
-
accessed on: March 25, [Online]
-
OpenStack Open Source Cloud Software, accessed on: March 25, 2013. [Online]. Available: http://openstack.org/
-
(2013)
OpenStack Open Source Cloud Software
-
-
|