-
1
-
-
70449395498
-
Stem cell issue: Stem cell research policies around the world
-
D. Dhar and J. H.-e. Ho, "Stem cell issue: stem cell research policies around the world," The Yale journal of biology and medicine, vol. 82, no. 3, p. 113, 2009.
-
(2009)
The Yale Journal of Biology and Medicine
, vol.82
, Issue.3
, pp. 113
-
-
Dhar, D.1
Ho, J.H.-E.2
-
2
-
-
84866363554
-
GeoProof: Proofs of geographic location for cloud computing environment
-
A. Albeshri, C. Boyd, and J. G. Nieto, "GeoProof: Proofs of Geographic Location for Cloud Computing Environment," in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. IEEE, 2012, pp. 506-514.
-
(2012)
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference On. IEEE
, pp. 506-514
-
-
Albeshri, A.1
Boyd, C.2
Nieto, J.G.3
-
3
-
-
84873677485
-
New approaches to security and availability for cloud data
-
Feb
-
A. Juels and A. Oprea, "New Approaches to Security and Availability for Cloud Data," Commun. ACM, vol. 56, no. 2, pp. 64-73, Feb. 2013. [Online]. Available: http: //doi.acm.org/10.1145/2408776.2408793
-
(2013)
Commun. ACM
, vol.56
, Issue.2
, pp. 64-73
-
-
Juels, A.1
Oprea, A.2
-
4
-
-
84872028984
-
Law and technology beyond location: Data security in the 21st century
-
D. Desai, "Law and Technology Beyond Location: Data Security in the 21st Century," Communications of the ACM, vol. 56, no. 1, pp. 34-36, 2013.
-
(2013)
Communications of the ACM
, vol.56
, Issue.1
, pp. 34-36
-
-
Desai, D.1
-
5
-
-
84911877810
-
DRAFT trusted geolocation in the cloud: Proof of concept implementation
-
E. Banks, M. Bartock, K. Firftal, D. Lemon, K. Scarfone, U. Shetty, M. Souppaya, T. Williams, and R. Yeluri, "DRAFT Trusted Geolocation in the Cloud: Proof of Concept Implementation," NIST special publication, vol. 7904, p. 42, 2012.
-
(2012)
NIST Special Publication
, vol.7904
, pp. 42
-
-
Banks, E.1
Bartock, M.2
Firftal, K.3
Lemon, D.4
Scarfone, K.5
Shetty, U.6
Souppaya, M.7
Williams, T.8
Yeluri, R.9
-
9
-
-
84868148974
-
Investigating an open source cloud storage infrastructure for cern-specific data analysis
-
S. Toor, R. Toebbicke, M. Z. Resines, and S. Holmgren, "Investigating an open source cloud storage infrastructure for CERN-specific data analysis," in Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on. IEEE, 2012, pp. 84-88.
-
(2012)
Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference On. IEEE
, pp. 84-88
-
-
Toor, S.1
Toebbicke, R.2
Resines, M.Z.3
Holmgren, S.4
-
10
-
-
84883356757
-
Using trusted platform modules for location assurance in cloud networking
-
Springer
-
C. Krauß and V. Fusenig, "Using trusted platform modules for location assurance in cloud networking," in Network and System Security. Springer, 2013, pp. 109-121.
-
(2013)
Network and System Security
, pp. 109-121
-
-
Krauß, C.1
Fusenig, V.2
-
11
-
-
84890886366
-
Domain-based storage protection (dbsp) in public infrastructure clouds
-
Springer
-
N. Paladi, C. Gehrmann, and F. Morenius, "Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds," in Secure IT Systems. Springer, 2013, pp. 279-296.
-
(2013)
Secure IT Systems
, pp. 279-296
-
-
Paladi, N.1
Gehrmann, C.2
Morenius, F.3
-
12
-
-
85065170765
-
Spanner: Googles globally-distributed database
-
J. C. Corbett, J. Dean, M. Epstein, A. Fikes, C. Frost, J. Furman, S. Ghemawat, A. Gubarev, C. Heiser, P. Hochschild et al., "Spanner: Googles globally-distributed database," in Proceedings of OSDI, vol. 1, 2012.
-
(2012)
Proceedings of OSDI
, vol.1
-
-
Corbett, J.C.1
Dean, J.2
Epstein, M.3
Fikes, A.4
Frost, C.5
Furman, J.6
Ghemawat, S.7
Gubarev, A.8
Heiser, C.9
Hochschild, P.10
-
13
-
-
84861307113
-
The nist definition of cloud computing (draft)
-
P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, 2011.
-
(2011)
NIST Special Publication
, vol.800
-
-
Mell, P.1
Grance, T.2
-
15
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing arbitrary functions of encrypted data," Communications of the ACM, vol. 53, no. 3, pp. 97-105, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
16
-
-
84922965436
-
-
Trusted Computing Group TCG Specification, Architecture Overview, revision 1.4 Trusted Computing Group, Tech. Rep., 2007
-
Trusted Computing Group, "TCG Specification, Architecture Overview, revision 1.4," Trusted Computing Group, Tech. Rep., 2007.
-
-
-
-
17
-
-
84929445167
-
Towards trusted cloud computing
-
ser. HotCloud'09. Berkeley, CA, USA: USENIX Association
-
N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards Trusted Cloud Computing," in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009. [Online]. Available: http: //dl.acm.org/citation.cfm?id=1855533.1855536
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
18
-
-
84875979259
-
Trusted launch of virtual machine instances in public iaas environments
-
Springer
-
N. Paladi, C. Gehrmann, M. Aslam, and F. Morenius, "Trusted launch of virtual machine instances in public IaaS environments," in Information Security and Cryptology-ICISC 2012. Springer, 2013, pp. 309-323.
-
(2013)
Information Security and Cryptology-ICISC 2012
, pp. 309-323
-
-
Paladi, N.1
Gehrmann, C.2
Aslam, M.3
Morenius, F.4
-
19
-
-
47749140025
-
Bigtable: A distributed storage system for structured data
-
F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber, "Bigtable: A distributed storage system for structured data," ACM Transactions on Computer Systems (TOCS), vol. 26, no. 2, p. 4, 2008.
-
(2008)
ACM Transactions on Computer Systems (TOCS)
, vol.26
, Issue.2
, pp. 4
-
-
Chang, F.1
Dean, J.2
Ghemawat, S.3
Hsieh, W.C.4
Wallach, D.A.5
Burrows, M.6
Chandra, T.7
Fikes, A.8
Gruber, R.E.9
-
20
-
-
70450064414
-
Dynamo: Amazon's highly available key-value store
-
ACM
-
G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, "Dynamo: amazon's highly available key-value store," in ACM SIGOPS Operating Systems Review, vol. 41, no. 6. ACM, 2007, pp. 205-220.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.6
, pp. 205-220
-
-
Decandia, G.1
Hastorun, D.2
Jampani, M.3
Kakulapati, G.4
Lakshman, A.5
Pilchin, A.6
Sivasubramanian, S.7
Vosshall, P.8
Vogels, W.9
-
21
-
-
82655182931
-
Windows azure storage: A highly available cloud storage service with strong consistency
-
B. Calder, J. Wang, A. Ogus, N. Nilakantan, A. Skjolsvold, S. McKelvie, Y. Xu, S. Srivastav, J. Wu, H. Simitci et al., "Windows azure storage: a highly available cloud storage service with strong consistency," in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, 2011, pp. 143-157.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM
, pp. 143-157
-
-
Calder, B.1
Wang, J.2
Ogus, A.3
Nilakantan, N.4
Skjolsvold, A.5
McKelvie, S.6
Xu, Y.7
Srivastav, S.8
Wu, J.9
Simitci, H.10
-
22
-
-
84922992008
-
-
Amazon Amazon Web Services[Online; accessed 20-Apr-2014]
-
Amazon, "Amazon Web Services," http: //aws.amazon.com/es/ec2/, [Online; accessed 20-Apr-2014].
-
-
-
-
23
-
-
82655179217
-
Transactional storage for geo-replicated systems
-
Y. Sovran, R. Power, M. K. Aguilera, and J. Li, "Transactional storage for geo-replicated systems," in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, 2011, pp. 385-400.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM
, pp. 385-400
-
-
Sovran, Y.1
Power, R.2
Aguilera, M.K.3
Li, J.4
-
24
-
-
84880548272
-
Making geo-replicated systems fast as possible, consistent when necessary
-
C. Li, D. Porto, A. Clement, J. Gehrke, N. Preguiça, and R. Rodrigues, "Making geo-replicated systems fast as possible, consistent when necessary," in Proceedings USENIX Symposium on Operating System Design and Implementation (OSDI), 2012.
-
(2012)
Proceedings USENIX Symposium on Operating System Design and Implementation (OSDI)
-
-
Li, C.1
Porto, D.2
Clement, A.3
Gehrke, J.4
Preguica, N.5
Rodrigues, R.6
-
25
-
-
85076711749
-
Stronger semantics for low-latency geo-replicated storage
-
W. Lloyd, M. J. Freedman, M. Kaminsky, and D. G. Andersen, "Stronger semantics for low-latency geo-replicated storage," in Symposium on Networked Systems Design and Implementation, 2013.
-
(2013)
Symposium on Networked Systems Design and Implementation
-
-
Lloyd, W.1
Freedman, M.J.2
Kaminsky, M.3
Andersen, D.G.4
-
26
-
-
84889921208
-
-
July, [Online; accessed 20-Apr-2014]
-
"TPM Specification, TPM Main Part-III Design Principles," http: //www. trustedcomputinggroup.org/resources, July 2007, [Online; accessed 20-Apr-2014].
-
(2007)
TPM Specification, TPM Main Part-III Design Principles
-
-
Lloyd, W.1
Freedman, M.J.2
Kaminsky, M.3
Andersen, D.G.4
-
27
-
-
34548136250
-
From text to geographic coordinates: The current state of geocoding
-
D. W. Goldberg, J. P. Wilson, and C. A. Knoblock, "From text to geographic coordinates: the current state of geocoding," URISA journal, vol. 19, no. 1, pp. 33-46, 2007.
-
(2007)
URISA Journal
, vol.19
, Issue.1
, pp. 33-46
-
-
Goldberg, D.W.1
Wilson, J.P.2
Knoblock, C.A.3
-
28
-
-
84867562920
-
A spoofing detection method for civilian l1 gps and the e1-b galileo safety of life service
-
C. J. Wullems, "A Spoofing Detection Method for Civilian L1 GPS and the E1-B Galileo Safety of Life Service," Aerospace and Electronic Systems, IEEE Transactions on, vol. 48, no. 4, pp. 2849-2864, 2012.
-
(2012)
Aerospace and Electronic Systems, IEEE Transactions on
, vol.48
, Issue.4
, pp. 2849-2864
-
-
Wullems, C.J.1
-
29
-
-
84891484196
-
Real-time gps spoofing detection via correlation of encrypted signals
-
B. W. O'Hanlon, M. L. Psiaki, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, "Real-Time GPS Spoofing Detection via Correlation of Encrypted Signals," Navigation, 2013.
-
(2013)
Navigation
-
-
O'Hanlon, B.W.1
Psiaki, M.L.2
Bhatti, J.A.3
Shepard, D.P.4
Humphreys, T.E.5
-
30
-
-
84885011422
-
Gps spoofing detection via dual-receiver correlation of military signals
-
M. L. Psiaki, B. W. O'Hanlon, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, "Gps spoofing detection via dual-receiver correlation of military signals," Aerospace and Electronic Systems, IEEE Transactions on, vol. 49, no. 4, pp. 2250-2267, 2013
-
(2013)
Aerospace and Electronic Systems, IEEE Transactions on
, vol.49
, Issue.4
, pp. 2250-2267
-
-
Psiaki, M.L.1
O'Hanlon, B.W.2
Bhatti, J.A.3
Shepard, D.P.4
Humphreys, T.E.5
|