-
1
-
-
84900000827
-
Information flow control for secure cloud computing
-
March
-
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, "Information Flow Control for Secure Cloud Computing", IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76-89, March 2014.
-
(2014)
IEEE TNSM SI Cloud Service Management
, vol.11
, Issue.1
, pp. 76-89
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.3
Singh, J.4
Papagiannis, I.5
Pietzuch, P.6
-
4
-
-
84944318145
-
-
Queen Mary University of London, School of Law, Tech. Rep.
-
K. Hon, C. Millard, C. Reed, J. Singh, I. Walden, and J. Crowcroft, "Policy, Legal and Regulatory Implications of a Europe-Only Cloud", Queen Mary University of London, School of Law, Tech. Rep., 2014. [Online]. Available: http://papers.ssrn. com/sol3/Delivery.cfm/SSRN ID2527951 code1577160.pdf
-
(2014)
Policy, Legal and Regulatory Implications of a Europe-only Cloud
-
-
Hon, K.1
Millard, C.2
Reed, C.3
Singh, J.4
Walden, I.5
Crowcroft, J.6
-
5
-
-
84937155256
-
Regional clouds: Technical considerations
-
J. Singh, J. Bacon, J. Crowcroft, A. Madhavapeddy, T. Pasquier, W. K. Hon, and C. Millard, "Regional Clouds: Technical Considerations", University of Cambridge, Computer Laboratory, Tech. Rep. UCAM-CL-TR-863, 2014. [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-863.pdf
-
(2014)
University of Cambridge, Computer Laboratory, Tech. Rep
-
-
Singh, J.1
Bacon, J.2
Crowcroft, J.3
Madhavapeddy, A.4
Pasquier, T.5
Hon, W.K.6
Millard, C.7
-
12
-
-
0027699087
-
Lattice-based access Control models
-
R. S. Sandhu, "Lattice-based Access Control Models", Computer, vol. 26, no. 11, pp. 9-19, 1993.
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
13
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Springer
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved Delegation of Computation Using Fully Homomorphic Encryption", in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 483-501.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
15
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, "Information Flow Control for Standard OS Abstractions", in 21st ACM Symposium on Operating Systems Principles, 2007, pp. 321-334.
-
(2007)
21st ACM Symposium on Operating Systems Principles
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
17
-
-
85094632142
-
Securing distributed systems with information flow control
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazières, "Securing Distributed Systems with Information Flow Control", in 5th USENIX Symposium on Networked System Design and Implementation, 2008, pp. 293-308.
-
(2008)
5th USENIX Symposium on Networked System Design and Implementation
, pp. 293-308
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
-
18
-
-
84944337916
-
Integrating middleware with information flow control
-
IEEE
-
J. Singh, T. Pasquier, J. Bacon, and D. Eyers, "Integrating Middleware with Information Flow Control", in International Conference on Cloud Engineering (IC2E). IEEE, 2015.
-
(2015)
International Conference on Cloud Engineering (IC2E)
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Eyers, D.4
-
21
-
-
0003400255
-
Integrity considerations for secure computer systems
-
K. J. Biba, "Integrity Considerations for Secure Computer Systems", MITRE Corp., Tech. Rep. ESD-TR 76-372, 1977.
-
(1977)
MITRE Corp., Tech. Rep
-
-
Biba, K.J.1
-
22
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., "A View of Cloud Computing", Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
23
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities
-
IEEE
-
R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities", in 10th IEEE International Conference on High Performance Computing and Communications. IEEE, 2008, pp. 5-13.
-
(2008)
10th IEEE International Conference on High Performance Computing and Communications
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
25
-
-
80053628507
-
From system-centric to datacentric logging-accountability, trust & Security in cloud computing
-
IEEE
-
R. K. Ko, M. Kirchberg, and B. S. Lee, "From System-centric to Datacentric Logging-accountability, Trust & Security in Cloud Computing", in Defense Science Research Conference and Expo (DSR), 2011. IEEE, 2011, pp. 1-4.
-
(2011)
Defense Science Research Conference and Expo (DSR), 2011
, pp. 1-4
-
-
Ko, R.K.1
Kirchberg, M.2
Lee, B.S.3
-
26
-
-
84920378718
-
Trustworthy geographically fenced hybrid clouds
-
ACM
-
K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis, and S. Tao, "Trustworthy Geographically Fenced Hybrid Clouds", in ACM/IFIP/Usenix Middleware. ACM, 2014.
-
(2014)
ACM/IFIP/Usenix Middleware
-
-
Jayaram, K.R.1
Safford, D.2
Sharma, U.3
Naik, V.4
Pendarakis, D.5
Tao, S.6
-
27
-
-
84882776670
-
The cloud needs cross-layer data handling annotations
-
IEEE
-
M. Henze, R. Hummen, and K. Wehrle, "The Cloud Needs Cross-Layer Data Handling Annotations", in Security and Privacy Workshops (SPW). IEEE, 2013, pp. 18-22.
-
(2013)
Security and Privacy Workshops (SPW)
, pp. 18-22
-
-
Henze, M.1
Hummen, R.2
Wehrle, K.3
-
29
-
-
84910660465
-
-
Intel, Tech
-
"Software Guard Extensions Programming Reference", Intel, Tech. Rep. 329298-001US, 2013. [Online]. Available: https://software.intel. com/sites/default/files/329298-001.pdf
-
(2013)
Software Guard Extensions Programming Reference
-
-
-
31
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
USENIX Association
-
A. Baumann, M. Peinado, and G. Hunt, "Shielding Applications from an Untrusted Cloud with Haven", in Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation. USENIX Association, 2014, pp. 267-283.
-
(2014)
Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation
, pp. 267-283
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
32
-
-
84868365803
-
Efficient data structures for tamper-evident logging
-
S. A. Crosby and D. S. Wallach, "Efficient Data Structures For Tamper-Evident Logging", in USENIX Security Symposium, 2009, pp. 317-334.
-
(2009)
USENIX Security Symposium
, pp. 317-334
-
-
Crosby, S.A.1
Wallach, D.S.2
-
35
-
-
84869486902
-
Abstractions for usable information flow control in aeolus
-
Boston
-
W. Cheng, D. R. K. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov, "Abstractions for Usable Information Flow Control in Aeolus", in Proc. USENIX Annual Technical Conference, Boston, 2012.
-
(2012)
Proc. USENIX Annual Technical Conference
-
-
Cheng, W.1
Ports, D.R.K.2
Schultz, D.3
Popic, V.4
Blankstein, A.5
Cowling, J.6
Curtis, D.7
Shrira, L.8
Liskov, B.9
-
36
-
-
84893522357
-
Network information flow control: Proof of concept
-
Oct.
-
A. Alghothami and F. Kammuller, "Network Information Flow Control: Proof of Concept", in Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on, Oct. 2013, pp. 2957-2962.
-
(2013)
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on
, pp. 2957-2962
-
-
Alghothami, A.1
Kammuller, F.2
-
37
-
-
70450227330
-
Laminar: Practical fine-grained decentralized information flow control
-
Jun.
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel, "Laminar: Practical Fine-grained Decentralized Information Flow Control", SIGPLAN Not., vol. 44, no. 6, pp. 63-74, Jun. 2009.
-
(2009)
SIGPLAN Not.
, vol.44
, Issue.6
, pp. 63-74
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
|