-
1
-
-
0242674432
-
Hippocratic databases
-
VLDB
-
Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic databases. In Proceedings of the 28th VLDB Conference. VLDB.
-
(2002)
Proceedings of the 28th VLDB Conference
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0012970453
-
Identity-based encryption from the weil pairing
-
Santa Barbara, CA: CRYPTO
-
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Proceedings of CRYPTO'01. Santa Barbara, CA: CRYPTO.
-
(2001)
Proceedings of CRYPTO'01
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84960252533
-
-
(n.d.), Retrieved from
-
IBM Big Data Hub. (n.d.). Retrieved from http://www.ibmbigdatahub.com/blog/how-build-security-big-data-environments
-
IBM Big Data Hub
-
-
-
8
-
-
67650951127
-
Online data storage using implicit security
-
Parakh, A., & Kak, S. (2009). Online data storage using implicit security. Information Sciences.
-
(2009)
Information Sciences
-
-
Parakh, A.1
Kak, S.2
-
12
-
-
84892599057
-
-
(Technical Report). Melbourne, Australia: Grids Laboratory, CSSE Department, The University of Melbourne
-
Ranjan, C., & Harwood, B. & Karunasekera. (2007). A scalable, robust, and decentralized resource discovery service for large scale federated grids (Technical Report GRIDS-TR-2007-6). Melbourne, Australia: Grids Laboratory, CSSE Department, The University of Melbourne.
-
(2007)
A scalable, robust, and decentralized resource discovery service for large scale federated grids
-
-
Ranjan, C.1
Harwood, B.2
Karunasekera3
-
14
-
-
74049087607
-
The reservoir model and architecture for open federated cloud computing export
-
Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., & Llorente, I. et al. (2009). The reservoir model and architecture for open federated cloud computing export. IBM Journal of Research and Development. doi:10.1147/JRD.2009.5429058
-
(2009)
IBM Journal of Research and Development
-
-
Rochwerger, B.1
Breitgand, D.2
Levy, E.3
Galis, A.4
Nagin, K.5
Llorente, I.6
-
15
-
-
84976840280
-
Using design patterns to develop reusable object-oriented communication software
-
Schmidt. (1995). Using design patterns to develop reusable object-oriented communication software. Communications of the ACM.
-
(1995)
Communications of the ACM.
-
-
-
18
-
-
79960839401
-
). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
Wang, G., Liu, Q., Wu, J., & Guo, M. (2011). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security. doi:10.1016/j.cose.2011.05.006
-
(2011)
Computers & Security
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
20
-
-
85032598821
-
entitled, Big Data age puts privacy in question as information becomes currency
-
Article, The Guardian
-
Article (2012) entitled, Big Data age puts privacy in question as information becomes currency. In The Guardian.
-
(2012)
-
-
-
21
-
-
35048892905
-
Public Key Encryption with Keyword Search
-
Boneh, D., Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public Key Encryption with Keyword Search. In Proceedings of Eurocrypt CompatibleOne - The Open Source Cloud Broker - www.compatibleone.org/
-
(2004)
Proceedings of Eurocrypt CompatibleOne - The Open Source Cloud Broker
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
23
-
-
84960316609
-
-
Deltacloud
-
Deltacloud http://deltacloud.apache.org/
-
-
-
-
24
-
-
85032596117
-
-
EasyCloud - Cloud Service broker
-
EasyCloud - Cloud Service broker - www.easycloud.it/
-
-
-
-
25
-
-
84960312094
-
-
Eucalyptus
-
Eucalyptus - http://www.eucalyptus.com/
-
-
-
-
27
-
-
80052573833
-
Tools and Technologies for Building Clouds
-
N. Antonopoulos, & L. Gillam (Eds.), Springer.
-
Jin, H., Ibrahim, S., Bell, T., Qi, L., Cao, H., Wu, S., & Shi, X. (2010). Tools and Technologies for Building Clouds. In N. Antonopoulos, & L. Gillam (Eds.), Cloud Computing: Principles, Systems and Applications. Springer. doi:10.1007/978-1-84996-241-4_1
-
(2010)
Cloud Computing: Principles, Systems and Applications
-
-
Jin, H.1
Ibrahim, S.2
Bell, T.3
Qi, L.4
Cao, H.5
Wu, S.6
Shi, X.7
-
29
-
-
84960212549
-
New I/O API
-
Retrieved 2007, from
-
Microsystems, S. (2002) New I/O API. Retrieved 2007, from http://java.sun.com/j2se/1.4.2/guid/nio/
-
(2002)
-
-
Microsystems, S.1
-
30
-
-
84960312424
-
-
Sep, Dr. Dobbs' Journal. RightScale Web site, (Dec. 2009)
-
Brain Pontarelli, (2005 Sep), High Performance I/O with Java NIO. Dr. Dobbs' Journal. RightScale Web site. http://www.rightscale.com (Dec. 2009).
-
(2005)
High Performance I/O with Java NIO
-
-
-
31
-
-
81355146314
-
Study of Privacy-Preserving Framework for Cloud Storage
-
RuWei. H., XiaoLin, G., Si, Y., Wei, Z (2011). Study of Privacy-Preserving Framework for Cloud Storage. In International Journal of Computer Science and Information Systems.
-
(2011)
International Journal of Computer Science and Information Systems
-
-
RuWei, H.1
XiaoLin, G.2
Si, Y.3
Wei, Z.4
-
32
-
-
84960231241
-
-
Scalr Web site, Dec.
-
Scalr Web site. http://www.scalr.net (Dec. 2009).
-
(2009)
-
-
-
34
-
-
84960259231
-
-
WeoCeo Web site, Dec.
-
WeoCeo Web site. http://weoceo.weogeo.com (Dec. 2009)
-
(2009)
-
-
-
35
-
-
84960209688
-
-
White Paper on Securing Big Data: Security Recommendations for Hadoop and NoSQL Environments
-
White Paper on Securing Big Data: Security Recommendations for Hadoop and NoSQL Environments. (2012)
-
(2012)
-
-
|