메뉴 건너뛰기




Volumn 1, Issue 1, 2012, Pages 1-19

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; RAIN;

EID: 84926426283     PISSN: None     EISSN: 2192113X     Source Type: Journal    
DOI: 10.1186/2192-113X-1-13     Document Type: Article
Times cited : (10)

References (43)
  • 1
    • 84864579259 scopus 로고    scopus 로고
    • Reference deployment models for eliminating user concerns on cloud security
    • Zhao G, Rong C, Jaatun MG, Sandnes F: Reference deployment models for eliminating user concerns on cloud security. J Supercomputing 2012, 61(2): 337-352. http://dx. doi. org/10. 1007/s11227-010-0460-9[10. 1007/s11227-010-0460-9].
    • (2012) J Supercomputing , vol.61 , Issue.2 , pp. 337-352
    • Zhao, G.1    Rong, C.2    Jaatun, M.G.3    Sandnes, F.4
  • 3
    • 77953250064 scopus 로고    scopus 로고
    • A probabilistic approach to information control
    • Nyre ÅA, Jaatun MG: A probabilistic approach to information control. J Internet Technol 2010, 11(3): 407-416.
    • (2010) J Internet Technol , vol.11 , Issue.3 , pp. 407-416
    • Nyre, ÅA.1    Jaatun, M.G.2
  • 16
    • 84926427861 scopus 로고    scopus 로고
    • Cybernetica News blog - Sharemind 2008. visited: Sept. 9
    • Cybernetica News blog - Sharemind 2008. visited: Sept. 9, 2010.
    • (2010)
  • 21
    • 71749106352 scopus 로고    scopus 로고
    • Deploying Mobile, Computation in Cloud Service
    • In: Jaatun M, Zhao G, Rong C (Eds), Berlin/Heidelberg
    • Li X, Zhang H, Zhang Y: Deploying Mobile, Computation in Cloud Service. In Jaatun M, Zhao G, Rong C (eds) Cloud Computing, Volume 5931 of Lecture Notes in Computer Science. Berlin /Heidelberg; 2009: pp. 301-311. http://dx. doi. org/10. 1007/978-3-642-10665-1/_27 [10. 1 007/978-3-642-10665-1_27].
    • (2009) Cloud Computing, Volume 5931 of Lecture Notes in Computer Science , pp. 301-311
    • Li, X.1    Zhang, H.2    Zhang, Y.3
  • 24
    • 0036804023 scopus 로고    scopus 로고
    • Mobile agent security
    • Borselius N: Mobile agent security. Electron & Commun Eng J 2002, 14(5): 211-218.
    • (2002) Electron & Commun Eng J , vol.14 , Issue.5 , pp. 211-218
    • Borselius, N.1
  • 26
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum DL: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 1981, 24: 84-90.
    • (1981) Commun ACM , vol.24 , pp. 84-90
    • Chaum, D.L.1
  • 28
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Abadi M, Needham R: Prudent engineering practice for cryptographic protocols. Software Eng, IEEE Trans 1996, 22: 6-15.
    • (1996) Software Eng, IEEE Trans , vol.22 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 31
  • 33
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A: How to share a secret. Commun ACM 1979, 22: 612-613.
    • (1979) Commun ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 34
    • 67650951127 scopus 로고    scopus 로고
    • Online data storage using implicit security
    • Parakh A, Kak S: Online data storage using implicit security. Inf Sci 2009, 179(19): 3323-3331. http://www. sciencedirect. com/science/article/pii/S0020025509002308.
    • (2009) Inf Sci , vol.179 , Issue.19 , pp. 3323-3331
    • Parakh, A.1    Kak, S.2
  • 35
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Rabin MO: Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 1989, 36(2): 335-348.
    • (1989) J ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 42
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum D: The dining cryptographers problem: Unconditional sender and recipient untraceability. J Cryptology 1988, 1: 65-75.
    • (1988) J Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.