-
1
-
-
84864579259
-
Reference deployment models for eliminating user concerns on cloud security
-
Zhao G, Rong C, Jaatun MG, Sandnes F: Reference deployment models for eliminating user concerns on cloud security. J Supercomputing 2012, 61(2): 337-352. http://dx. doi. org/10. 1007/s11227-010-0460-9[10. 1007/s11227-010-0460-9].
-
(2012)
J Supercomputing
, vol.61
, Issue.2
, pp. 337-352
-
-
Zhao, G.1
Rong, C.2
Jaatun, M.G.3
Sandnes, F.4
-
3
-
-
77953250064
-
A probabilistic approach to information control
-
Nyre ÅA, Jaatun MG: A probabilistic approach to information control. J Internet Technol 2010, 11(3): 407-416.
-
(2010)
J Internet Technol
, vol.11
, Issue.3
, pp. 407-416
-
-
Nyre, ÅA.1
Jaatun, M.G.2
-
6
-
-
79960903995
-
A Farewell to, Trust: An Approach to Confidentiality Control in the Cloud
-
Piscataway, NJ: IEEE
-
Jaatun MG, Nyre ÅA, Alapnes S, Zhao G: A Farewell to, Trust: An Approach to Confidentiality Control in the Cloud. In Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011). IEEE, Piscataway, NJ; 2011.
-
(2011)
In: Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011)
-
-
Jaatun, M.G.1
Nyre, ÅA.2
Alapnes, S.3
Zhao, G.4
-
8
-
-
74349113474
-
On Technical Security Issues in Cloud Computing
-
Los Alamitos
-
Jensen M, Schwenk J, Gruschka N, Iacono LL: On Technical Security Issues in Cloud Computing. In Cloud Computing, IEEE International Conference on, Volume 0. Los Alamitos; 2009: pp. 109-116.
-
(2009)
In: Cloud Computing, IEEE International Conference on, Volume 0
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
10
-
-
74049152260
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
-
ACM New York
-
Ristenpart T, Tromer E, Shacham H, Savage S: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security 2009, pp. 199-212. ACM New York.
-
(2009)
In: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
14
-
-
84943547553
-
Pond: the OceanStore Prototype
-
Rhea S, Eaton P, Geels D, Weatherspoon H, Zhao B, Kubiatowicz J: Pond: the OceanStore Prototype. In: Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST '03) 2003.
-
(2003)
In: Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST '03)
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
16
-
-
84926427861
-
-
Cybernetica News blog - Sharemind 2008. visited: Sept. 9
-
Cybernetica News blog - Sharemind 2008. visited: Sept. 9, 2010.
-
(2010)
-
-
-
18
-
-
79960574840
-
Deliverance from Trust through a Redundant Array of Independent Net-storages in Cloud Computing
-
Zhao G, Jaatun MG, Vasilakos A, Nyre ÅA, Alapnes S, Ye Q, Tang Y: Deliverance from Trust through a Redundant Array of Independent Net-storages in Cloud Computing. In: Proceedings of IEEE Infocom 2011.
-
(2011)
In: Proceedings of IEEE Infocom
-
-
Zhao, G.1
Jaatun, M.G.2
Vasilakos, A.3
Nyre, Å.A.4
Alapnes, S.5
Ye, Q.6
Tang, Y.7
-
21
-
-
71749106352
-
Deploying Mobile, Computation in Cloud Service
-
In: Jaatun M, Zhao G, Rong C (Eds), Berlin/Heidelberg
-
Li X, Zhang H, Zhang Y: Deploying Mobile, Computation in Cloud Service. In Jaatun M, Zhao G, Rong C (eds) Cloud Computing, Volume 5931 of Lecture Notes in Computer Science. Berlin /Heidelberg; 2009: pp. 301-311. http://dx. doi. org/10. 1007/978-3-642-10665-1/_27 [10. 1 007/978-3-642-10665-1_27].
-
(2009)
Cloud Computing, Volume 5931 of Lecture Notes in Computer Science
, pp. 301-311
-
-
Li, X.1
Zhang, H.2
Zhang, Y.3
-
23
-
-
77952728012
-
Cloud Agency: A Mobile Agent Based Cloud System
-
Aversa R, Di Martino B, Rak M, Venticinque S: Cloud Agency: A Mobile Agent Based Cloud System. In: Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on 2010, pp. 132-137.
-
(2010)
In: Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on
, pp. 132-137
-
-
Aversa, R.1
Di Martino, B.2
Rak, M.3
Venticinque, S.4
-
24
-
-
0036804023
-
Mobile agent security
-
Borselius N: Mobile agent security. Electron & Commun Eng J 2002, 14(5): 211-218.
-
(2002)
Electron & Commun Eng J
, vol.14
, Issue.5
, pp. 211-218
-
-
Borselius, N.1
-
26
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum DL: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 1981, 24: 84-90.
-
(1981)
Commun ACM
, vol.24
, pp. 84-90
-
-
Chaum, D.L.1
-
27
-
-
50249133191
-
Shining Light in, Dark Places: Understanding the Tor Network
-
Berlin / Heidelberg
-
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D: Shining Light in, Dark Places: Understanding the Tor Network. In Borisov N, Goldberg I (eds) Privacy Enhancing Technologies, Volume 5134 of Lecture Notes in Computer Science. Berlin /Heidelberg; 2008: pp. 63-76.
-
(2008)
In: Borisov N, Goldberg I (Eds) Privacy Enhancing Technologies, Volume 5134 of Lecture Notes in Computer Science
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
28
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Abadi M, Needham R: Prudent engineering practice for cryptographic protocols. Software Eng, IEEE Trans 1996, 22: 6-15.
-
(1996)
Software Eng, IEEE Trans
, vol.22
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
30
-
-
33845567771
-
Nessi: A Python Network Simulator for Fast Protocol Development
-
NJ: Piscataway
-
Vernez J, Ehrensberger J, Robert S: Nessi: A Python Network Simulator for Fast Protocol Development. In Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, 2006 11th International, Workshop on. Piscataway, NJ; 2006: pp. 67-71.
-
(2006)
In:Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, 2006 11th International, Workshop on
, pp. 67-71
-
-
Vernez, J.1
Ehrensberger, J.2
Robert, S.3
-
33
-
-
0018545449
-
How to share a secret
-
Shamir A: How to share a secret. Commun ACM 1979, 22: 612-613.
-
(1979)
Commun ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
67650951127
-
Online data storage using implicit security
-
Parakh A, Kak S: Online data storage using implicit security. Inf Sci 2009, 179(19): 3323-3331. http://www. sciencedirect. com/science/article/pii/S0020025509002308.
-
(2009)
Inf Sci
, vol.179
, Issue.19
, pp. 3323-3331
-
-
Parakh, A.1
Kak, S.2
-
35
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin MO: Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 1989, 36(2): 335-348.
-
(1989)
J ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
37
-
-
77954899284
-
RACS: a case for cloud storage diversity
-
New York, NY, USA
-
Abu-Libdeh H, Princehouse L, Weatherspoon H: RACS: a case for cloud storage diversity. In Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10. New York, NY, USA; 2010: 229-240.
-
(2010)
In: Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC '10
, pp. 229-240
-
-
Abu-Libdeh, H.1
Princehouse, L.2
Weatherspoon, H.3
-
42
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum D: The dining cryptographers problem: Unconditional sender and recipient untraceability. J Cryptology 1988, 1: 65-75.
-
(1988)
J Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
|