메뉴 건너뛰기




Volumn , Issue , 2015, Pages 410-415

Expressing and enforcing location requirements in the cloud using information flow control

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; COMPLIANCE CONTROL; FLOW CONTROL; LOCATION;

EID: 84942456663     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IC2E.2015.71     Document Type: Conference Paper
Times cited : (19)

References (37)
  • 12
    • 0027699087 scopus 로고
    • Lattice-based access Control models
    • R. S. Sandhu, "Lattice-based Access Control Models", Computer, vol. 26, no. 11, pp. 9-19, 1993.
    • (1993) Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 13
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Springer
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved Delegation of Computation Using Fully Homomorphic Encryption", in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 483-501.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 21
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • K. J. Biba, "Integrity Considerations for Secure Computer Systems", MITRE Corp., Tech. Rep. ESD-TR 76-372, 1977.
    • (1977) MITRE Corp., Tech. Rep
    • Biba, K.J.1
  • 25
    • 80053628507 scopus 로고    scopus 로고
    • From system-centric to datacentric logging-accountability, trust & Security in cloud computing
    • IEEE
    • R. K. Ko, M. Kirchberg, and B. S. Lee, "From System-centric to Datacentric Logging-accountability, Trust & Security in Cloud Computing", in Defense Science Research Conference and Expo (DSR), 2011. IEEE, 2011, pp. 1-4.
    • (2011) Defense Science Research Conference and Expo (DSR), 2011 , pp. 1-4
    • Ko, R.K.1    Kirchberg, M.2    Lee, B.S.3
  • 29
    • 84910660465 scopus 로고    scopus 로고
    • Intel, Tech
    • "Software Guard Extensions Programming Reference", Intel, Tech. Rep. 329298-001US, 2013. [Online]. Available: https://software.intel. com/sites/default/files/329298-001.pdf
    • (2013) Software Guard Extensions Programming Reference
  • 32
    • 84868365803 scopus 로고    scopus 로고
    • Efficient data structures for tamper-evident logging
    • S. A. Crosby and D. S. Wallach, "Efficient Data Structures For Tamper-Evident Logging", in USENIX Security Symposium, 2009, pp. 317-334.
    • (2009) USENIX Security Symposium , pp. 317-334
    • Crosby, S.A.1    Wallach, D.S.2
  • 37
    • 70450227330 scopus 로고    scopus 로고
    • Laminar: Practical fine-grained decentralized information flow control
    • Jun.
    • I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel, "Laminar: Practical Fine-grained Decentralized Information Flow Control", SIGPLAN Not., vol. 44, no. 6, pp. 63-74, Jun. 2009.
    • (2009) SIGPLAN Not. , vol.44 , Issue.6 , pp. 63-74
    • Roy, I.1    Porter, D.E.2    Bond, M.D.3    McKinley, K.S.4    Witchel, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.