-
1
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
X. Zhang, M. Nakae, M.J. Covington, and R. Sandhu Toward a usage-based security framework for collaborative computing systems ACM Trans. Inf. Syst. Secur. 11 1 2008 3
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1
, pp. 3
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
2
-
-
78649806730
-
Securecloud: Towards a comprehensive security framework for cloud computing environments
-
H. Takabi, J.B. Joshi, G.J. Ahn, Securecloud: Towards a comprehensive security framework for cloud computing environments, in: 2010 IEEE 34th Annual Conference, Computer Software and Applications Workshops, COMPSACW, July, 2010, pp. 393-398.
-
(2010)
2010 IEEE 34th Annual Conference, Computer Software and Applications Workshops, COMPSACW, July
, pp. 393-398
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.J.3
-
3
-
-
33751044459
-
A security framework for wireless sensor networks
-
T. Zia, A. Zomaya, A security framework for wireless sensor networks, in: Proceedings of the IEEE Sensors Applications Symposium, February, 2006, pp. 49-53.
-
(2006)
Proceedings of the IEEE Sensors Applications Symposium, February
, pp. 49-53
-
-
Zia, T.1
Zomaya, A.2
-
5
-
-
79951515545
-
Cloud computing - The business perspective
-
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi Cloud computing - The business perspective Decis. Support Syst. 51 1 2011 176 189
-
(2011)
Decis. Support Syst.
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
6
-
-
84902317248
-
Cloud storage and bioinformatics in a private cloud deployment: Lessons for data intensive research
-
Springer International Publishing
-
V. Chang, R.J. Walters, and G. Wills Cloud storage and bioinformatics in a private cloud deployment: Lessons for data intensive research Cloud Computing and Services Science 2013 Springer International Publishing 245 264
-
(2013)
Cloud Computing and Services Science
, pp. 245-264
-
-
Chang, V.1
Walters, R.J.2
Wills, G.3
-
8
-
-
84939476793
-
The improved cloud computing adoption framework to deliver secure services
-
Lisbon, Portugal, 20-22 May
-
M. Ramachandran, V. Chang, C.S. Li, The improved cloud computing adoption framework to deliver secure services, in: Emerging Software as a Service and Analytics 2015 Workshop, ESaaSA 2015, in Conjunction with CLOSER 2015, Lisbon, Portugal, 20-22 May, 2015.
-
(2015)
Emerging Software As A Service and Analytics 2015 Workshop, ESaaSA 2015, in Conjunction with CLOSER 2015
-
-
Ramachandran, M.1
Chang, V.2
Li, C.S.3
-
9
-
-
80053414801
-
TrustCloud: A framework for accountability and trust in cloud computing
-
R.K. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, B.S. Lee, TrustCloud: A framework for accountability and trust in cloud computing, in: 2011 IEEE World Congress on Services, SERVICES, July, 2011, pp. 584-588.
-
(2011)
2011 IEEE World Congress on Services, SERVICES, July
, pp. 584-588
-
-
Ko, R.K.1
Jagadpramana, P.2
Mowbray, M.3
Pearson, S.4
Kirchberg, M.5
Liang, Q.6
Lee, B.S.7
-
12
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
14
-
-
84885584051
-
A hybrid cloud storage architecture for service operational high availability
-
Y.H. Kuo, Y.L. Jeng, J.N. Chen, A hybrid cloud storage architecture for service operational high availability, in: Proceedings of the 37th IEEE Annual International Computers, Software & Applications Conference, IEEE COMPSAC 2013, July, 2013, pp. 487-492.
-
(2013)
Proceedings of the 37th IEEE Annual International Computers, Software & Applications Conference, IEEE COMPSAC 2013, July
, pp. 487-492
-
-
Kuo, Y.H.1
Jeng, Y.L.2
Chen, J.N.3
-
17
-
-
79956072588
-
Scalable SQL and NoSQL data stores
-
R. Cattell Scalable SQL and NoSQL data stores ACM SIGMOD Rec. 39 4 2010 12 27
-
(2010)
ACM SIGMOD Rec.
, vol.39
, Issue.4
, pp. 12-27
-
-
Cattell, R.1
-
18
-
-
84855888662
-
Survey on NoSQL database
-
J. Han, E. Haihong, G. Le, J. Du, Survey on NoSQL database, in: Proceedings of the 6th International Conference on Pervasive Computing and Applications, ICPCA 2011, October, 2011, pp. 363-366.
-
(2011)
Proceedings of the 6th International Conference on Pervasive Computing and Applications, ICPCA 2011, October
, pp. 363-366
-
-
Han, J.1
Haihong, E.2
Le, G.3
Du, J.4
-
19
-
-
84937922898
-
-
U.S. Patent Application (Priority No.: 13/954,885)
-
Y.H. Kuo, Y.L. Jeng, Apparatus, Method, and Non-transitory Computer Readable Storage Medium Thereof for Controlling Access of a Resource, U.S. Patent Application (Priority No.: 13/954,885).
-
Apparatus, Method, and Non-transitory Computer Readable Storage Medium Thereof for Controlling Access of A Resource
-
-
Kuo, Y.H.1
Jeng, Y.L.2
-
21
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inf. Theory 29 2 1983 198 208
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
22
-
-
0027308007
-
Cascade ciphers: The importance of being first
-
U.M. Maurer, and J.L. Massey Cascade ciphers: The importance of being first J. Cryptol. 6 1 1993 55 61
-
(1993)
J. Cryptol.
, vol.6
, Issue.1
, pp. 55-61
-
-
Maurer, U.M.1
Massey, J.L.2
-
23
-
-
84868349605
-
Stronger key derivation via sequential memory-hard functions
-
C. Percival, Stronger key derivation via sequential memory-hard functions, in: The BSD Conference, BSDCan, May, 2009.
-
(2009)
The BSD Conference, BSDCan, May
-
-
Percival, C.1
-
24
-
-
84937831796
-
-
U.S. Patent Application (Priority No.: 14/292,901)
-
Y.H. Kuo, Y.L. Jeng, Secure Synchronization Apparatus, Method, and Non-transitory Computer Readable Storage Medium Thereof, U.S. Patent Application (Priority No.: 14/292,901).
-
Secure Synchronization Apparatus, Method, and Non-transitory Computer Readable Storage Medium Thereof
-
-
Kuo, Y.H.1
Jeng, Y.L.2
-
25
-
-
84937953955
-
-
U.S. Patent Application (Priority No.: 14/300,955)
-
k.Y. Wang, Y.H. Kuo, Y.L. Jeng, Synchronization Apparatus, Method, and Non-transitory Computer Readable Storage Medium, U.S. Patent Application (Priority No.: 14/300,955).
-
Synchronization Apparatus, Method, and Non-transitory Computer Readable Storage Medium
-
-
Wang, K.Y.1
Kuo, Y.H.2
Jeng, Y.L.3
-
26
-
-
84977864689
-
Towards data security with the cloud computing adoption framework
-
V. Chang, and M. Ramachandran Towards data security with the cloud computing adoption framework IEEE Trans. Serv. Comput. 8 6 2015
-
(2015)
IEEE Trans. Serv. Comput.
, vol.8
, Issue.6
-
-
Chang, V.1
Ramachandran, M.2
-
27
-
-
84927724623
-
Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples
-
N. Antunes, and M. Vieira Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples IEEE Trans. Serv. Comput. 8 2 2015 269 283
-
(2015)
IEEE Trans. Serv. Comput.
, vol.8
, Issue.2
, pp. 269-283
-
-
Antunes, N.1
Vieira, M.2
-
28
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
A. Kieyzun, P.J. Guo, K. Jayaraman, M.D. Ernst, Automatic creation of SQL injection and cross-site scripting attacks, in: IEEE 31st International Conference on Software Engineering, 2009. ICSE 2009, May, 2009, pp. 199-209.
-
(2009)
IEEE 31st International Conference on Software Engineering, 2009. ICSE 2009, May
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
31
-
-
0038562418
-
-
NIST Publication 800-12, downloaded from
-
NIST, An introduction to computer security. Publication 800-12, 1996, downloaded from http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf.
-
(1996)
An Introduction to Computer Security
-
-
|