메뉴 건너뛰기




Volumn 52, Issue , 2015, Pages 106-127

Toward protecting control flow confidentiality in cloud-based computation

Author keywords

Cloud computing; Confidentiality; Program analysis; Program obfuscation; Security

Indexed keywords

CLOUD COMPUTING; INVESTMENTS; MAINTENANCE; REVERSE ENGINEERING;

EID: 84929302814     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2015.04.005     Document Type: Article
Times cited : (11)

References (40)
  • 1
    • 84878810103 scopus 로고    scopus 로고
    • accessed 04.01.15
    • AWS Case Study: Euclid, http://aws.amazon.com/solutions/case-studies/euclid/, [accessed 04.01.15].
    • AWS Case Study: Euclid
  • 2
    • 84878810103 scopus 로고    scopus 로고
    • accessed 04.01.15
    • AWS Case Study: Nearmap, http://aws.amazon.com/solutions/case-studies/nearmap/, [accessed 04.01.15].
    • AWS Case Study: Nearmap
  • 3
    • 84878810103 scopus 로고    scopus 로고
    • accessed 04.01.15
    • AWS Case Study: Bioproximity, http://aws.amazon.com/solutions/case-studies/bioproximity/, [accessed 04.01.15].
    • AWS Case Study: Bioproximity
  • 6
    • 84929382531 scopus 로고    scopus 로고
    • accessed 04.01. 15
    • Bioproximity, http://www.bioproximity.com, [accessed 04.01. 15].
  • 7
    • 0022808786 scopus 로고
    • A computational approach to edge detection
    • IEEE Nov. PAMI
    • John Canny A computational approach to edge detection IEEE Trans Pattern Analysis Mach Intell PAMI-8 6 Nov. 1986 679 698 IEEE
    • (1986) IEEE Trans Pattern Analysis Mach Intell , vol.8 , Issue.6 , pp. 679-698
    • Canny, J.1
  • 8
    • 84894280079 scopus 로고    scopus 로고
    • Toward private joins on outsourced data
    • IEEE
    • Bogdan Carbunar, and Radu Sion Toward private joins on outsourced data IEEE Trans Knowl Data Eng 24 9 2012 1699 1710 IEEE
    • (2012) IEEE Trans Knowl Data Eng , vol.24 , Issue.9 , pp. 1699-1710
    • Carbunar, B.1    Sion, R.2
  • 9
    • 84959058990 scopus 로고    scopus 로고
    • Protecting software code by guards
    • Springer Berlin Heidelberg
    • Hoi Chang, and Atallah Mikhail Protecting software code by guards Secur Priv Digital Rights Manag 2002 160 175 Springer Berlin Heidelberg
    • (2002) Secur Priv Digital Rights Manag , pp. 160-175
    • Chang, H.1    Mikhail, A.2
  • 10
    • 84929382532 scopus 로고    scopus 로고
    • accessed 04.01.15
    • Cloudinary, http://cloudinary.com/features#image-manipulation, [accessed 04.01.15].
  • 11
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • Aug. IEEE
    • Christian Collberg, and Clark Thomborson Watermarking, tamper-proofing, and obfuscation - tools for software protection IEEE Trans Softw Eng 28 8 Aug 2002 735 746 IEEE
    • (2002) IEEE Trans Softw Eng , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 13
  • 16
    • 84929382533 scopus 로고    scopus 로고
    • accessed 04.01.15
    • Euclid, http://euclidanalytics.com, [accessed 04.01.15].
  • 22
    • 84929382534 scopus 로고    scopus 로고
    • accessed 04.01.15
    • Hadoop4Images, https://github.com/Aishraj/Hadoop4Images/blob/master/Hadoop4Images/src/canny/CannyEdgeDetector.java, [accessed 04.01.15].
    • Hadoop4Images
  • 25
    • 84929382535 scopus 로고    scopus 로고
    • accessed 04.01.15
    • Nearmap, http://us.nearmap.com, [accessed 04.01.15].
  • 28
    • 80053031586 scopus 로고    scopus 로고
    • Code obfuscation against static and dynamic reverse engineering
    • Proceedings of the 13th International Conference on Information Hiding
    • Sebastian Schrittwieser, and Stefan Katzenbeisser Code obfuscation against static and dynamic reverse engineering Proceedings of the 13th international conference on Information Hiding LNCS vol. 6958 2011 270 284
    • (2011) LNCS , vol.6958 , pp. 270-284
    • Schrittwieser, S.1    Katzenbeisser, S.2
  • 29
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • IEEE
    • Edward J. Schwartz, Thanassis Avgerinos, and David Brumley All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) Proceedings of 2010 IEEE symposium on Security and Privacy (S&P 2010) 2010 IEEE 317 331
    • (2010) Proceedings of 2010 IEEE Symposium on Security and Privacy (S&P 2010) , pp. 317-331
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 37
    • 84929317908 scopus 로고    scopus 로고
    • Cross Cloud MapReduce: A result integrity check framework on hybrid clouds
    • Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa Cross Cloud MapReduce: a result integrity check framework on hybrid clouds Int J Cloud Comput (IJCC) 1 1 2013 26 39
    • (2013) Int J Cloud Comput (IJCC) , vol.1 , Issue.1 , pp. 26-39
    • Wang, Y.1    Wei, J.2    Srivatsa, M.3
  • 40


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.