메뉴 건너뛰기




Volumn , Issue , 2014, Pages 77-106

A trust point-based security architecture for sensor data in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; GATEWAYS (COMPUTER NETWORKS); NETWORK ARCHITECTURE; TRUSTED COMPUTING;

EID: 84930362469     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-319-12718-7_6     Document Type: Chapter
Times cited : (17)

References (54)
  • 10
    • 70450170255 scopus 로고    scopus 로고
    • The application/json Media Type for JavaScript Object Notation (JSON)
    • Crockford, D.: The application/json Media Type for JavaScript Object Notation (JSON). RFC 4627 (2006)
    • (2006) RFC , pp. 4627
    • Crockford, D.1
  • 15
    • 77649240581 scopus 로고    scopus 로고
    • Computing Arbitrary Functions of Encrypted Data
    • Gentry, C.: Computing Arbitrary Functions of Encrypted Data. Commun. ACM 53(3) (2010)
    • (2010) Commun. ACM , vol.53 , Issue.3
    • Gentry, C.1
  • 16
    • 84890883068 scopus 로고    scopus 로고
    • GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code
    • Guarnieri, S., Livshits, B.: GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In: 18th USENIX Security Symposium (USENIX Security) (2009)
    • (2009) 18Th USENIX Security Symposium (USENIX Security)
    • Guarnieri, S.1    Livshits, B.2
  • 29
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic Cloud Storage
    • R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Sebé (eds.), Springer
    • Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Sebé (eds.) Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 6054. Springer (2010)
    • (2010) Financial Cryptography and Data Security, Lecture Notes in Computer Science , vol.6054
    • Kamara, S.1    Lauter, K.2
  • 32
    • 64249101946 scopus 로고    scopus 로고
    • A Proof of Security of Yao’s Protocol for Two-Party Computation
    • Lindell, Y., Pinkas, B.: A Proof of Security of Yao’s Protocol for Two-Party Computation. Journal of Cryptology 22(2) (2009)
    • (2009) Journal of Cryptology , vol.22 , Issue.2
    • Lindell, Y.1    Pinkas, B.2
  • 33
    • 35348989745 scopus 로고    scopus 로고
    • Trusted Computing
    • Mitchell, C.J. (ed.): Trusted Computing. IEE (2005)
    • (2005) IEE
    • Mitchell, C.J.1
  • 34
    • 46449128945 scopus 로고    scopus 로고
    • Transmission of IPv6 Packets over IEEE 802.15.4 Networks
    • Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944 (2007)
    • (2007) RFC , pp. 4944
    • Montenegro, G.1    Kushalnagar, N.2    Hui, J.3    Culler, D.4
  • 47
    • 85025679901 scopus 로고    scopus 로고
    • strongSwan-IPsec for Linux
    • The strongSwan Project: strongSwan-IPsec for Linux. online@http://strongswan.org (2013)
    • (2013)
    • The strongSwan Project1
  • 49
    • 79953294892 scopus 로고    scopus 로고
    • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    • Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847-859 (2011)
    • (2011) IEEE Trans. Parallel Distrib. Syst , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 51
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: 2010 Proceedings IEEE INFOCOM (2010)
    • (2010) 2010 Proceedings IEEE INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.