-
1
-
-
59849089966
-
Is cloud computing really ready for prime time?
-
N. Leavitt, "Is cloud computing really ready for prime time?" Computer, vol. 42, no. 1, pp. 15-25, 2009.
-
(2009)
Computer
, vol.42
, Issue.1
, pp. 15-25
-
-
Leavitt, N.1
-
2
-
-
78649290366
-
The nist definition of cloud computing
-
P. Mell and T. Grance, "The nist definition of cloud computing", National Institute of Standards and Technology, vol. 53, no. 6, article 50, 2009.
-
(2009)
National Institute of Standards and Technology
, vol.53
, Issue.6
-
-
Mell, P.1
Grance, T.2
-
3
-
-
0012419393
-
-
John Wiley and sons
-
F. Berman, G. Fox, and A. J. G. Hey, Grid Computing: Making the Global Infrastructure a Reality, Volume 2, John Wiley and sons, 2003.
-
(2003)
Grid Computing: Making the Global Infrastructure a Reality
, vol.2
-
-
Berman, F.1
Fox, G.2
Hey, A.J.G.3
-
4
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents", IACR Cryptology EPrint Archive, vol. 186, 2008.
-
(2008)
IACR Cryptology EPrint Archive
, vol.186
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
5
-
-
84877272118
-
Security and privacy in cloud computing
-
Z. Xiao and Y. Xiao, "Security and privacy in cloud computing", IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
6
-
-
84874224563
-
Privacy and security issues in cloud computing: The role of institutions and institutional evolution
-
N. Kshetri, "Privacy and security issues in cloud computing: the role of institutions and institutional evolution", Telecommunications Policy, vol. 37, no. 4-5, pp. 372-386, 2013.
-
(2013)
Telecommunications Policy
, vol.37
, Issue.4-5
, pp. 372-386
-
-
Kshetri, N.1
-
7
-
-
84899798215
-
Cloud computing risk assessment: A systematic literature review
-
Springer, Berlin, Germany
-
R. Latif, H. Abbas, S. Assar, and Q. Ali, "Cloud computing risk assessment: a systematic literature review", in Future Information Technology, pp. 285-295, Springer, Berlin, Germany, 2014.
-
(2014)
Future Information Technology
, pp. 285-295
-
-
Latif, R.1
Abbas, H.2
Assar, S.3
Ali, Q.4
-
8
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avižienis, J. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing", IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
10
-
-
84055200868
-
Surveying and analyzing security, privacy and trust issues in cloud computing environments
-
chn, August
-
D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying and analyzing security, privacy and trust issues in cloud computing environments", in Proceedings of the International Conference on Advanced in Control Engineering and Information Science (CEIS'11), pp. 2852-2856, chn, August 2011.
-
(2011)
Proceedings of the International Conference on Advanced in Control Engineering and Information Science (CEIS'11)
, pp. 2852-2856
-
-
Sun, D.1
Chang, G.2
Sun, L.3
Wang, X.4
-
11
-
-
84934896833
-
Data security framework for cloud computing networks
-
A. Pandey, R. M. Tugnayat, and A. K. Tiwari, "Data Security Framework for Cloud Computing Networks", International Journal of Computer Engineering & Technology, vol. 4, no. 1, pp. 178-181, 2013.
-
(2013)
International Journal of Computer Engineering & Technology
, vol.4
, Issue.1
, pp. 178-181
-
-
Pandey, A.1
Tugnayat, R.M.2
Tiwari, A.K.3
-
13
-
-
84896633141
-
-
Tech. Rep., Liverpool John Moores University, Liverpool, UK
-
M. Y. A. Younis and K. Kifayat, "Secure cloud computing for critical infrastructure: a survey", Tech. Rep., Liverpool John Moores University, Liverpool, UK, 2013.
-
(2013)
Secure Cloud Computing for Critical Infrastructure: A Survey
-
-
Younis, M.Y.A.1
Kifayat, K.2
-
14
-
-
84899737369
-
A new security and privacy framework for RFID in cloud computing
-
Bristol, UK
-
S. Kardaş, S. Çelik, M. A. Bingöl, and A. Levi, "A new security and privacy framework for RFID in cloud computing", in Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (Cloud Com'13), Bristol, UK, 2013.
-
(2013)
Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (Cloud Com'13)
-
-
Kardaş, S.1
Çelik, S.2
Bingöl, M.A.3
Levi, A.4
-
15
-
-
84857170570
-
Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
-
IEEE, December
-
A. Behl, "Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation", in Proceedings of the World Congress on Information and Communication Technologies (WICT'11), pp. 217-222, IEEE, December 2011.
-
(2011)
Proceedings of the World Congress on Information and Communication Technologies (WICT'11)
, pp. 217-222
-
-
Behl, A.1
-
16
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
Hangzhou, China, March
-
D. Chen and H. Zhao, "Data security and privacy protection issues in cloud computing", in Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE'12), vol. 1, pp. 647-651, Hangzhou, China, March 2012.
-
(2012)
Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE'12)
, vol.1
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
17
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
November
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation", in Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09), pp. 43-53, November 2009.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09)
, pp. 43-53
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
18
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
ACM, Chicago, Ill, USA, November
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: a high-availability and integrity layer for cloud storage", in Proceedings of the 16th ACM conference on Computer and Communications Security, pp. 187-198, ACM, Chicago, Ill, USA, November 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
19
-
-
78650083239
-
Seeding clouds with trust anchors
-
ACM, October
-
J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel, "Seeding clouds with trust anchors", in Proceedings of the ACM workshop on Cloud computing security workshop (CCSW'10), pp. 43-46, ACM, October 2010.
-
(2010)
Proceedings of the ACM Workshop on Cloud Computing Security Workshop (CCSW'10)
, pp. 43-46
-
-
Schiffman, J.1
Moyer, T.2
Vijayakumar, H.3
Jaeger, T.4
McDaniel, P.5
-
20
-
-
84994083888
-
Data security over cloud
-
D. H. Rakesh, R. R. Bhavsar, and A. S. Thorve, "Data security over cloud", International Journal of Computer Applications, no. 5, pp. 11-14, 2012.
-
(2012)
International Journal of Computer Applications
, Issue.5
, pp. 11-14
-
-
Rakesh, D.H.1
Bhavsar, R.R.2
Thorve, A.S.3
-
21
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms", Foundations of Secure Computation, vol. 4, no. 11, pp. 169-180, 1978.
-
(1978)
Foundations of Secure Computation
, vol.4
, Issue.11
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
23
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Springer
-
D. Boneh, "The decision Diffie-Hellman problem", in Algorithmic Number Theory, vol. 1423, pp. 48-63, Springer, 1998.
-
(1998)
Algorithmic Number Theory
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
25
-
-
84914110992
-
Secure user data in cloud computing using encryption algorithms
-
R. Arora, A. Parashar, and C. C. I. Transforming, "Secure user data in cloud computing using encryption algorithms", International Journal of Engineering Research and Applications, vol. 3, no. 4, pp. 1922-1926, 2013.
-
(2013)
International Journal of Engineering Research and Applications
, vol.3
, Issue.4
, pp. 1922-1926
-
-
Arora, R.1
Parashar, A.2
Transforming, C.C.I.3
-
29
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
30
-
-
84856080479
-
Mcdb: Using multiclouds to ensure security in cloud computing
-
M. A. Al Zain, B. Soh, and E. Pardede, "Mcdb: using multiclouds to ensure security in cloud computing", in Proceedings of the IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC'11), pp. 784-791, 2011.
-
(2011)
Proceedings of the IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC'11)
, pp. 784-791
-
-
Al Zain, M.A.1
Soh, B.2
Pardede, E.3
-
31
-
-
79952804464
-
Security as a service (sass): Securing user data by coprocessor and distributing the data
-
IEEE, December
-
C. P. Ram and G. Sreenivaasan, "Security as a service (sass): securing user data by coprocessor and distributing the data", in Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, (TISC'10), pp. 152-155, IEEE, December 2010.
-
(2010)
Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, (TISC'10)
, pp. 152-155
-
-
Ram, C.P.1
Sreenivaasan, G.2
-
32
-
-
80054993404
-
A framework for resource allocation strategies in cloud computing environment
-
July
-
M. Asad Arfeen, K. Pawlikowski, and A. Willig, "A framework for resource allocation strategies in cloud computing environment", in Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW'11), pp. 261-266, July 2011.
-
(2011)
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW'11)
, pp. 261-266
-
-
Asad Arfeen, M.1
Pawlikowski, K.2
Willig, A.3
-
34
-
-
84864838621
-
Enhanced data security model for cloud computing
-
IEEE
-
E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing", in Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12), pp. CC-12-CC-17, IEEE, 2012.
-
(2012)
Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12)
, pp. CC12-CC17
-
-
Mohamed, E.M.1
Abdelkader, H.S.2
El-Etriby, S.3
-
36
-
-
80052768216
-
Cloud computing, security and data concealment
-
Kerkyra, Greece, July
-
C. Delettre, K. Boudaoud, and M. Riveill, "Cloud computing, security and data concealment", in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC'11), pp. 424-431, Kerkyra, Greece, July 2011.
-
(2011)
Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC'11)
, pp. 424-431
-
-
Delettre, C.1
Boudaoud, K.2
Riveill, M.3
-
37
-
-
84885890734
-
Fade: Secure overlay cloud storage with file assured deletion
-
Springer, New York, NY, USA
-
Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, "Fade: secure overlay cloud storage with file assured deletion", in Security and Privacy in Communication Networks, pp. 380-397, Springer, New York, NY, USA, 2010.
-
(2010)
Security and Privacy in Communication Networks
, pp. 380-397
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
Perlman, R.4
-
38
-
-
80955142131
-
Do you know where your cloud files are?
-
ACM, October
-
K. Benson, R. Dowsley, and H. Shacham, "Do you know where your cloud files are?" in Proceedings of the 3rd ACMworkshop on Cloud computing security workshop, pp. 73-82, ACM, October 2011.
-
(2011)
Proceedings of the 3rd ACMworkshop on Cloud Computing Security Workshop
, pp. 73-82
-
-
Benson, K.1
Dowsley, R.2
Shacham, H.3
-
39
-
-
84863181209
-
Depot: Cloud storage with minimal trust
-
P. Mahajan, S. Setty, S. Lee et al., "Depot: cloud storage with minimal trust", ACM Transactions on Computer Systems, vol. 29, no. 4, article 12, 2011.
-
(2011)
ACM Transactions on Computer Systems
, vol.29
, Issue.4
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
-
40
-
-
84991960975
-
SPORC: Group collaboration using untrusted cloud resources
-
A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten, "SPORC: group collaboration using untrusted cloud resources", in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10), vol. 10, pp. 337-350, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10)
, vol.10
, pp. 337-350
-
-
Feldman, A.J.1
Zeller, W.P.2
Freedman, M.J.3
Felten, E.W.4
-
41
-
-
84947200665
-
Failure trends in a large disk drive population
-
E. Pinheiro, W.-D. Weber, and L. A. Barroso, "Failure trends in a large disk drive population", in Proceedings of the 5th USENIX conference on File and Storage Technologies (FAST'07), vol. 7, pp. 17-23.
-
Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST'07)
, vol.7
, pp. 17-23
-
-
Pinheiro, E.1
Weber, W.-D.2
Barroso, L.A.3
-
42
-
-
84866668816
-
A study of soft error consequences in hard disk drives
-
Boston, Mass, USA, June
-
T. Tsai, N. Theera-Ampornpunt, and S. Bagchi, "A study of soft error consequences in hard disk drives", in Proceeding of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'12), pp. 1-8, Boston, Mass, USA, June 2012.
-
(2012)
Proceeding of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'12)
, pp. 1-8
-
-
Tsai, T.1
Theera-Ampornpunt, N.2
Bagchi, S.3
-
43
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm, "A survey of computational location privacy", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
44
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
IEEE, December
-
S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing", in Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom'10), pp. 693-702, IEEE, December 2010.
-
(2010)
Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom'10)
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
45
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
ACM
-
E. Stefanov, M. van Dijk, E. Shi et al., "Path oram: an extremely simple oblivious ram protocol", in Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, pp. 299-310, ACM, 2013.
-
(2013)
Proceedings of the ACM SIGSAC Conference on Computer & Communications Security
, pp. 299-310
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
-
46
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
S. Paquette, P. T. Jaeger, and S. C. Wilson, "Identifying the security risks associated with governmental use of cloud computing", Government Information Quarterly, vol. 27, no. 3, pp. 245-253, 2010.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.T.2
Wilson, S.C.3
-
47
-
-
78649322624
-
A survey on security issues in service delivery models of cloud
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud", Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
48
-
-
82455221304
-
A cloud you can trust
-
C. Cachin and M. Schunter, "A cloud you can trust", IEEE Spectrum, vol. 48, no. 12, pp. 28-51, 2011.
-
(2011)
IEEE Spectrum
, vol.48
, Issue.12
, pp. 28-51
-
-
Cachin, C.1
Schunter, M.2
-
49
-
-
84866747256
-
Attribution of fraudulent resource consumption in the cloud
-
June
-
J. Idziorek, M. Tannian, and D. Jacobson, "Attribution of Fraudulent Resource Consumption in the cloud", in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD'12), pp. 99-106, June 2012.
-
(2012)
Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD'12)
, pp. 99-106
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
50
-
-
77955797759
-
Cloud computing system based on trusted computing platform
-
IEEE, May
-
Z. Shen, L. Li, F. Yan, and X. Wu, "Cloud computing system based on trusted computing platform", in Proceedings of the International Conference on Intelligent Computation Technology and Automation (ICICTA'10), vol. 1, pp. 942-945, IEEE, May 2010.
-
(2010)
Proceedings of the International Conference on Intelligent Computation Technology and Automation (ICICTA'10)
, vol.1
, pp. 942-945
-
-
Shen, Z.1
Li, L.2
Yan, F.3
Wu, X.4
-
51
-
-
79961133763
-
Implementing trust in cloud infrastructures
-
IEEE Computer Society, May
-
R. Neisse, D. Holling, and A. Pretschner, "Implementing trust in cloud infrastructures", in Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid'11), pp. 524-533, IEEE Computer Society, May 2011.
-
(2011)
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid'11)
, pp. 524-533
-
-
Neisse, R.1
Holling, D.2
Pretschner, A.3
-
52
-
-
84870806304
-
Building trust and compliance in the cloud for services
-
San Jose, Calif, USA, July
-
R. Yeluri, E. Castro-Leon, R. R. Harmon, and J. Greene, "Building trust and compliance in the cloud for services", in Proceedings of the Annual SRII Global Conference (SRII'12), pp. 379-390, San Jose, Calif, USA, July 2012.
-
(2012)
Proceedings of the Annual SRII Global Conference (SRII'12)
, pp. 379-390
-
-
Yeluri, R.1
Castro-Leon, E.2
Harmon, R.R.3
Greene, J.4
-
53
-
-
78650536265
-
Protection of identity information in cloud computing without trusted third party
-
November
-
R. Ranchal, B. Bhargava, L. B. Othmane et al., "Protection of identity information in cloud computing without trusted third party", in Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS'10), pp. 368-372, November 2010.
-
(2010)
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS'10)
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.B.3
-
54
-
-
77957933159
-
Preventing information leakage fromindexing in the cloud
-
July
-
A. Squicciarini, S. Sundareswaran, and D. Lin, "Preventing information leakage fromindexing in the cloud", in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD'10), pp. 188-195, July 2010.
-
(2010)
Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD'10)
, pp. 188-195
-
-
Squicciarini, A.1
Sundareswaran, S.2
Lin, D.3
-
55
-
-
77956356055
-
Trusted cloud computing with secure resources and data coloring
-
K. Hwang and D. Li, "Trusted cloud computing with secure resources and data coloring", IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.5
, pp. 14-22
-
-
Hwang, K.1
Li, D.2
|