-
1
-
-
84942211371
-
Ubiquitous computing
-
M. Weiser, "Ubiquitous computing," Computer, vol. 26, no. 10, pp. 71-72, 1993.
-
(1993)
Computer
, vol.26
, Issue.10
, pp. 71-72
-
-
Weiser, M.1
-
3
-
-
78650562912
-
-
Goldman Sachs, New York, Tech. Rep
-
S. Jankowski, J. Covello, H. Bellini, J. Ritchie, and D. Costa, "The Internet of Things: Making Sense of the Next Mega-Trend," Goldman Sachs, New York, Tech. Rep., 2014 [Online]. Available: http://www. goldmansachs.com/our-thinking/outlook/internet-of-things/iot-report.pdf
-
(2014)
The Internet of Things: Making Sense of the Next Mega-Trend
-
-
Jankowski, S.1
Covello, J.2
Bellini, H.3
Ritchie, J.4
Costa, D.5
-
4
-
-
84908397157
-
Internet of Things for smart cities
-
Feb
-
A. Zanella, "Internet of Things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
-
6
-
-
84863451487
-
Moving application logic from the firmware to the cloud: Towards the thin server architecture for the Internet of Things
-
M. Kovatsch, S. Mayer, and B. Ostermaier, "Moving application logic from the firmware to the cloud: Towards the thin server architecture for the Internet of Things," in Proc. 6th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS), 2012, pp. 751-756.
-
(2012)
Proc. 6th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS)
, pp. 751-756
-
-
Kovatsch, M.1
Mayer, S.2
Ostermaier, B.3
-
7
-
-
84868520809
-
-
M.S. thesis, Dept. Comput. Lab., Univ. Cambridge, Cambridge, U.K
-
E. P. Leverett, "Quantitatively assessing and visualising industrial system attack surfaces," M.S. thesis, Dept. Comput. Lab., Univ. Cambridge, Cambridge, U.K., 2011.
-
(2011)
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
-
-
Leverett, E.P.1
-
8
-
-
84900000827
-
Information flow control for secure cloud computing
-
Mar
-
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, "Information flow control for secure cloud computing," IEEE Trans. Netw. Serv. Manage., vol. 11, no. 1, pp. 76-89, Mar. 2014.
-
(2014)
IEEE Trans. Netw. Serv. Manage
, vol.11
, Issue.1
, pp. 76-89
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.3
Singh, J.4
Papagiannis, I.5
Pietzuch, P.6
-
9
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
Aug
-
P. Ohm, "Broken promises of privacy: Responding to the surprising failure of anonymization," UCLA Law Rev., vol. 57, no. 6, pp. 1701-1777, Aug. 2010.
-
(2010)
UCLA Law Rev
, vol.57
, Issue.6
, pp. 1701-1777
-
-
Ohm, P.1
-
10
-
-
84937155256
-
Regional clouds: Technical considerations
-
accessed on Jul. 21
-
J. Singh et al., "Regional clouds: Technical considerations," Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-863, 2014 [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CLTR-863.pdf, accessed on Jul. 21, 2015.
-
(2015)
Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-863, 2014
-
-
Singh, J.1
-
11
-
-
84885043855
-
-
ITU Telecommun. Standard. Sector, Tech. Rep. Y.2060, Jun
-
"Overview of the Internet of Things," ITU Telecommun. Standard. Sector, Tech. Rep. Y.2060, Jun. 2012.
-
(2012)
Overview of the Internet of Things
-
-
-
12
-
-
84937153133
-
-
arXiv:1502.01181
-
J. Mineraud, O. Mazhelis, X. Su, and S. Tarkoma, "A gap analysis of Internet-of-Things platforms," 2015, arXiv:1502.01181 [Online]. Available: http://arxiv.org/abs/1502.01181
-
(2015)
A Gap Analysis of Internet-of-Things Platforms
-
-
Mineraud, J.1
Mazhelis, O.2
Su, X.3
Tarkoma, S.4
-
13
-
-
84924367178
-
Enabling smart cloud services through remote sensing: An Internet of Everything enabler
-
S. Abdelwahab, B. Hamdaoui, M. Guizani, and A. Rayes, "Enabling smart cloud services through remote sensing: An Internet of Everything enabler," IEEE Internet Things J., vol. 1, no. 3, pp. 276-288, 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.3
, pp. 276-288
-
-
Abdelwahab, S.1
Hamdaoui, B.2
Guizani, M.3
Rayes, A.4
-
14
-
-
77956877124
-
The Internet of Things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
15
-
-
84883160796
-
Security and privacy threats in IoT architectures
-
D. Kozlov, J. Veijalainen, and Y. Ali, "Security and privacy threats in IoT architectures," in Proc. 7th Int. Conf. Body Area Netw. (BodyNets), 2012, pp. 256-262.
-
(2012)
Proc. 7th Int. Conf. Body Area Netw. (BodyNets)
, pp. 256-262
-
-
Kozlov, D.1
Veijalainen, J.2
Ali, Y.3
-
18
-
-
55849126555
-
Datagram transport layer security (DTLS) extension to establish keys for the secure real-time transport protocol (SRTP)
-
D. McGrew and E. Rescorla, "Datagram transport layer security (DTLS) extension to establish keys for the secure real-time transport protocol (SRTP)," Internet Engineering Task Force (IETF), RFC 5764, 2010 [Online]. Available: http://datatracker.ietf.org/doc/rfc5764
-
(2010)
Internet Engineering Task Force (IETF), RFC 5764
-
-
McGrew, D.1
Rescorla, E.2
-
19
-
-
84919978090
-
Securing the Internet of Things: A standardization perspective
-
S. L. Keoh, S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective," IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.L.1
Kumar, S.2
Tschofenig, H.3
-
20
-
-
84876000333
-
LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things
-
P. Urien, "LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things," in Proc. IEEE Consum. Commun. Netw. Conf. (CCNC), 2013, pp. 845-846.
-
(2013)
Proc. IEEE Consum. Commun. Netw. Conf. (CCNC)
, pp. 845-846
-
-
Urien, P.1
-
23
-
-
84922992001
-
Trusted platform module
-
New York, NY, USA: Springer
-
T. Morris, "Trusted platform module," in Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2011, pp. 1332-1335.
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 1332-1335
-
-
Morris, T.1
-
24
-
-
84983157129
-
A secure hardware module and system concept for local and remote industrial embedded system identification
-
C. Lesjak, T. Ruprechter, J. Haid, H. Bock, and E. Brenner, "A secure hardware module and system concept for local and remote industrial embedded system identification," in Proc. Emerg. Technol. Factory Autom. (ETFA), 2014, pp. 1-7.
-
(2014)
Proc. Emerg. Technol. Factory Autom. (ETFA)
, pp. 1-7
-
-
Lesjak, C.1
Ruprechter, T.2
Haid, J.3
Bock, H.4
Brenner, E.5
-
26
-
-
84903144750
-
On middleware for emerging health services
-
J. Singh and J. Bacon, "On middleware for emerging health services," J. Internet Serv. Appl., vol. 5, no. 6, pp. 1-34, 2014.
-
(2014)
J. Internet Serv. Appl
, vol.5
, Issue.6
, pp. 1-34
-
-
Singh, J.1
Bacon, J.2
-
28
-
-
85152504598
-
Metrics-driven security objective decomposition for an e-health application with adaptive security management
-
R. M. Savola and H. Abie, "Metrics-driven security objective decomposition for an e-health application with adaptive security management," in Proc. Int. Workshop Adapt. Secur., 2013, p. 6.
-
(2013)
Proc. Int. Workshop Adapt. Secur
, pp. 6
-
-
Savola, R.M.1
Abie, H.2
-
29
-
-
84910095773
-
-
London, U.K.: Oxford Univ. Press
-
C. J. Millard, Ed., Cloud Computing Law. London, U.K.: Oxford Univ. Press, 2013.
-
(2013)
Cloud Computing Law
-
-
Millard, C.J.1
-
30
-
-
84921471718
-
-
accessed on Jul. 21, 2015
-
N. Dhanjani. (2013). Reconsidering the perimeter security argument [Online]. Available: http://www.dhanjani.com/docs/Reconsidering%20 the%20Perimeter%20Security%20Argument.pdf, accessed on Jul. 21, 2015.
-
(2013)
Reconsidering the Perimeter Security Argument
-
-
Dhanjani, N.1
-
31
-
-
84969800654
-
-
Intel IT Centre
-
Intel IT Centre, What's Holding Back the Cloud?, Intel Corporation, 2012 [Online]. Available: http://www.intel.co.uk/content/dam/www/public/ us/en/documents/ reports/whats-holding-back-The-cloud-peer-researchreport2. pdf
-
(2012)
What's Holding Back the Cloud?, Intel Corporation
-
-
-
32
-
-
84969857531
-
Information flow control for a medical web portal
-
Lisbon, Portugal
-
T. Pasquier, B. Shand, and J. Bacon, "Information flow control for a medical web portal," in Proc. IADIS Int. Conf. e-Society, IADIS, Lisbon, Portugal, 2013, pp. 123-130 [Online]. Available: http://www.iadisportal.org/e-society-2013-proceedings
-
(2013)
Proc. IADIS Int. Conf. E-Society, IADIS
, pp. 123-130
-
-
Pasquier, T.1
Shand, B.2
Bacon, J.3
-
33
-
-
34548029519
-
Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors
-
New York, NY, USA: ACM
-
S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors," in ACMSIGOPS Operating Syst. Rev. New York, NY, USA: ACM, 2007, vol. 41, no. 3, pp. 275-287.
-
(2007)
ACMSIGOPS Operating Syst. Rev
, vol.41
, Issue.3
, pp. 275-287
-
-
Soltesz, S.1
Pötzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
34
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham et al., "Xen and the art of virtualization," in SIGOPS Operating Syst. Rev., 2003, vol. 37, no. 5, pp. 164-177.
-
(2003)
SIGOPS Operating Syst. Rev
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
-
35
-
-
84958066223
-
Innovative technology for CPU based attestation and sealing
-
I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata, "Innovative technology for CPU based attestation and sealing," Intel Corporation, 2013 [Online]. Available: https://software.intel.com/sites/default/files/ article /413939/hasp-2013-innovative-technology-for-attestation-andsealing. pdf.
-
(2013)
Intel Corporation
-
-
Anati, I.1
Gueron, S.2
Johnson, S.P.3
Scarlata, V.R.4
-
36
-
-
84944348355
-
Information flow control for strong protection with flexible sharing in PaaS
-
T. F. J.-M. Pasquier, J. Singh, and J. Bacon, "Information flow control for strong protection with flexible sharing in PaaS," in Proc. Int. Workshop Future of PaaS (IC2E), 2015, pp. 279-282.
-
(2015)
Proc. Int. Workshop Future of PaaS (IC2E)
, pp. 279-282
-
-
Pasquier, T.F.J.-M.1
Singh, J.2
Bacon, J.3
-
37
-
-
84942456662
-
-
arXiv:1506.04391
-
T. Pasquier, J. Singh, D. Eyers, and J. Bacon, CamFlow: Managed datasharing for cloud services, 2015, arXiv:1506.04391 [Online]. Available: http://arxiv.org/abs/1506.04391
-
(2015)
CamFlow: Managed Datasharing for Cloud Services
-
-
Pasquier, T.1
Singh, J.2
Eyers, D.3
Bacon, J.4
-
38
-
-
84944314473
-
Integrating middleware with information flow control
-
J. Singh, T. Pasquier, J. Bacon, and D. Eyers, "Integrating middleware with information flow control," in Proc. Int. Conf. Cloud Eng. (IC2E), 2015, pp. 54-59.
-
(2015)
Proc. Int. Conf. Cloud Eng. (IC2E)
, pp. 54-59
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Eyers, D.4
-
42
-
-
77953213147
-
Myths and fallacies of personally identifiable information
-
A. Narayanan and V. Shmatikov, "Myths and fallacies of personally identifiable information," Comm. ACM, vol. 53, pp. 24-26, 2010.
-
(2010)
Comm. ACM
, vol.53
, pp. 24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
43
-
-
70349305273
-
Differential privacy: A survey of results
-
New York, NY, USA: Springer
-
C. Dwork, "Differential privacy: A survey of results," in Theory and Applications of Models of Computation. New York, NY, USA: Springer, 2008, pp. 1-19.
-
(2008)
Theory and Applications of Models of Computation
, pp. 1-19
-
-
Dwork, C.1
-
44
-
-
84910685712
-
RAPPOR: Randomized aggregatable privacy-preserving ordinal response
-
Ú. Erlingsson, V. Pihur, and A. Korolova, "RAPPOR: Randomized aggregatable privacy-preserving ordinal response," in Proc. SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 1054-1067.
-
(2014)
Proc. SIGSAC Conf. Comput. Commun. Secur
, pp. 1054-1067
-
-
Erlingsson, Ú.1
Pihur, V.2
Korolova, A.3
-
45
-
-
84885971632
-
Challenges of privacy protection in big data analytics
-
M. Jensen, "Challenges of privacy protection in big data analytics," in Proc. IEEE Int. Congr. Big Data, 2013, pp. 235-238.
-
(2013)
Proc. IEEE Int. Congr. Big Data
, pp. 235-238
-
-
Jensen, M.1
-
47
-
-
33750045529
-
Federated security: The Shibboleth approach
-
R. Morgan, S. Cantor, S. Carmody, W. Hoehn, and K. Klingenstein, "Federated security: The Shibboleth approach," Educause Q., vol. 27, pp. 12-17, 2004.
-
(2004)
Educause Q
, vol.27
, pp. 12-17
-
-
Morgan, R.1
Cantor, S.2
Carmody, S.3
Hoehn, W.4
Klingenstein, K.5
-
49
-
-
85002424663
-
Identity authentication and capability based access control (IACAC) for the Internet of Things
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity authentication and capability based access control (IACAC) for the Internet of Things," J. Cyber Secur. Mobility, vol. 1, no. 4, pp. 309-348, 2013.
-
(2013)
J. Cyber Secur. Mobility
, vol.1
, Issue.4
, pp. 309-348
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
50
-
-
70350787080
-
Self managed security cell, a security model for the Internet of Things and services
-
P. De Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair, "Self managed security cell, a security model for the Internet of Things and services," in Proc. 1st Int. Conf. Adv. Future Internet, 2009, pp. 47-52.
-
(2009)
Proc. 1st Int. Conf. Adv. Future Internet
, pp. 47-52
-
-
De Leusse, P.1
Periorellis, P.2
Dimitrakos, T.3
Nair, S.K.4
-
52
-
-
84969789271
-
A right to identity to face the Internet of Things
-
P. De Hert, "A right to identity to face the Internet of Things?," UNESCO 2008 [Online]. Available: http://portal.unesco.org/ci/en/files/ 25857/12021328273de-Hert-Paul.pdf/de%2BHert-Paul.pdf
-
(2008)
UNESCO
-
-
De Hert, P.1
-
53
-
-
67650337204
-
Legal safeguards for privacy and data protection in ambient intelligence
-
P. De Hert, S. Gutwirth, A. Moscibroda, D. Wright, and G. G. Fuster, "Legal safeguards for privacy and data protection in ambient intelligence," Pers. Ubiq. Comput., vol. 13, no. 6, pp. 435-444, 2009.
-
(2009)
Pers. Ubiq. Comput
, vol.13
, Issue.6
, pp. 435-444
-
-
De Hert, P.1
Gutwirth, S.2
Moscibroda, A.3
Wright, D.4
Fuster, G.G.5
-
55
-
-
84969869132
-
3D data management: Controlling data volume, velocity and variety
-
L. Douglas, "3D data management: Controlling data volume, velocity and variety," Gartner Inc. [Online]. Available: http://blogs.gartner.com/ doug-laney/files /2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf
-
Gartner Inc
-
-
Douglas, L.1
-
56
-
-
84969758283
-
DDoS attack and defence in cloud
-
New York, NY, USA: Springer
-
S. Yu, "DDoS attack and defence in cloud," in Distributed Denial of Service Attack and Defense. New York, NY, USA: Springer, 2014, pp. 77-93.
-
(2014)
Distributed Denial of Service Attack and Defense
, pp. 77-93
-
-
Yu, S.1
-
57
-
-
80053414801
-
TrustCloud: A framework for accountability and trust in cloud computing
-
R. K. Ko et al., "TrustCloud: A framework for accountability and trust in cloud computing," in Proc. IEEE World Congr. Serv. (SERVICES), 2011, pp. 584-588.
-
(2011)
Proc. IEEE World Congr. Serv. (SERVICES)
, pp. 584-588
-
-
Ko, R.K.1
-
58
-
-
80053628507
-
From system-centric to datacentric logging-accountability, trust &security in cloud computing
-
R. K. Ko, M. Kirchberg, and B. S. Lee, "From system-centric to datacentric logging-accountability, trust &security in cloud computing," in Proc. Defense Sci. Res. Conf. Expo. (DSR), 2011, pp. 1-4.
-
(2011)
Proc. Defense Sci. Res. Conf. Expo. (DSR)
, pp. 1-4
-
-
Ko, R.K.1
Kirchberg, M.2
Lee, B.S.3
-
59
-
-
85094664400
-
Chukwa: A system for reliable large-scale log collection
-
A. Rabkin and R. H. Katz, "Chukwa: A system for reliable large-scale log collection," in Proc. 24th Int. Conf. Large Install. Syst. Admin. (LISA), USENIX, 2010, vol. 10, pp. 1-15.
-
(2010)
Proc. 24th Int. Conf. Large Install. Syst. Admin. (LISA), USENIX
, vol.10
, pp. 1-15
-
-
Rabkin, A.1
Katz, R.H.2
-
60
-
-
84986593233
-
Making every bit count in wide-area analytics
-
May
-
A. Rabkin, M. Arye, S. Sen, V. Pai, and M. J. Freedman, "Making every bit count in wide-area analytics," in HotOS, May 2013, 6 pp.
-
(2013)
HotOS
-
-
Rabkin, A.1
Arye, M.2
Sen, S.3
Pai, V.4
Freedman, M.J.5
-
61
-
-
84863395085
-
Advances and challenges in log analysis
-
A. Oliner, A. Ganapathi, and W. Xu, "Advances and challenges in log analysis," Comm. ACM, vol. 55, no. 2, pp. 55-61, 2012.
-
(2012)
Comm. ACM
, vol.55
, Issue.2
, pp. 55-61
-
-
Oliner, A.1
Ganapathi, A.2
Xu, W.3
-
62
-
-
84903583631
-
-
Utrecht Univ., Tech. Rep. UU-CS-2012-013
-
A. Elyasov, I. Prasetya, and J. Hage, "Log-based reduction by rewriting," Utrecht Univ., Tech. Rep. UU-CS-2012-013, 2012.
-
(2012)
Log-based Reduction by Rewriting
-
-
Elyasov, A.1
Prasetya, I.2
Hage, J.3
-
63
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
64
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. Iacono, "On technical security issues in cloud computing," in Proc. IEEE Int. Conf. Cloud Comput. (CLOUD'09), 2009, pp. 109-116.
-
(2009)
Proc. IEEE Int. Conf. Cloud Comput. (CLOUD'09)
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
65
-
-
38149015558
-
New strategies for revocation in ad-hoc networks
-
T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, "New strategies for revocation in ad-hoc networks," in Proc. 4th Eur. Conf. Secur. Privacy Ad-Hoc Sens. Netw., 2007, pp. 232-246.
-
(2007)
Proc. 4th Eur. Conf. Secur. Privacy Ad-Hoc Sens. Netw
, pp. 232-246
-
-
Moore, T.1
Clulow, J.2
Nagaraja, S.3
Anderson, R.4
-
66
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
MA, USA: Kluwer
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. IFIP TC6/TC11 6th Joint Work. Conf. Commun. Multimedia Secur. Adv. Commun. Multimedia Secur. Norwell, MA, USA: Kluwer, 2002, pp. 107-121.
-
(2002)
Proc. IFIP TC6/TC11 6th Joint Work. Conf. Commun. Multimedia Secur. Adv. Commun. Multimedia Secur. Norwell
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
68
-
-
84873696561
-
Cloud services certification
-
A. Sunyaev and S. Schneider, "Cloud services certification," Commun. ACM, vol. 56, no. 2, pp. 33-36, 2013.
-
(2013)
Commun. ACM
, vol.56
, Issue.2
, pp. 33-36
-
-
Sunyaev, A.1
Schneider, S.2
-
69
-
-
84856273290
-
Automated certification for compliant cloud-based business processes
-
New York, NY, USA: Springer
-
R. Accorsi, D.-I. L. Lowis, and Y. Sato, "Automated certification for compliant cloud-based business processes," in Business &Information Systems Engineering. New York, NY, USA: Springer, 2011, vol. 3, no. 3, pp. 145-154.
-
(2011)
Business &Information Systems Engineering
, vol.3
, Issue.3
, pp. 145-154
-
-
Accorsi, R.1
Lowis, D.-I.L.2
Sato, Y.3
-
70
-
-
84888019509
-
Bridging the GAP between software certification and trusted computing for securing cloud computing
-
A. Muñoz and A. Mana, "Bridging the GAP between software certification and trusted computing for securing cloud computing," in Proc. 9th World Congr. Serv. (SERVICES), 2013, pp. 103-110.
-
(2013)
Proc. 9th World Congr. Serv. (SERVICES)
, pp. 103-110
-
-
Muñoz, A.1
Mana, A.2
-
71
-
-
84948085734
-
Automatic data protection certificates for cloud-services based on secure logging
-
New York, NY, USA: Springer
-
T. Kunz, A. Selzer, and U. Waldmann, "Automatic data protection certificates for cloud-services based on secure logging," in Trusted Cloud Computing. New York, NY, USA: Springer, 2014, pp. 59-75.
-
(2014)
Trusted Cloud Computing
, pp. 59-75
-
-
Kunz, T.1
Selzer, A.2
Waldmann, U.3
-
72
-
-
77953032795
-
SLA perspective in security management for cloud computing
-
S. A. de Chaves, C. B. Westphall, and F. R. Lamin, "SLA perspective in security management for cloud computing," in Proc. 6th Int. Conf. Netw. Serv. (ICNS), 2010, pp. 212-217.
-
(2010)
Proc. 6th Int. Conf. Netw. Serv. (ICNS)
, pp. 212-217
-
-
De Chaves, S.A.1
Westphall, C.B.2
Lamin, F.R.3
-
73
-
-
80455144630
-
Security SLAs for federated cloud services
-
K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, "Security SLAs for federated cloud services," in Proc. 6th Int. Conf. Availability Reliab. Secur. (ARES), 2011, pp. 202-209.
-
(2011)
Proc. 6th Int. Conf. Availability Reliab. Secur. (ARES)
, pp. 202-209
-
-
Bernsmed, K.1
Jaatun, M.G.2
Meland, P.H.3
Undheim, A.4
-
74
-
-
84964358331
-
-
Tech. Rep. 329298-001US, 2013 accessed on Jul. 21
-
Intel, Software guard extensions programming reference, Tech. Rep. 329298-001US, 2013 [Online]. Available: https://software.intel.com/ sites/default/files/329298-001.pdf, accessed on Jul. 21, 2015.
-
(2015)
Software Guard Extensions Programming Reference
-
-
-
75
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM: Virtualizing the trusted platform module," in Proc. Secur. Symp., 2006, pp. 305-320.
-
(2006)
Proc. Secur. Symp
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
76
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
A. Baumann, M. Peinado, and G. Hunt, "Shielding applications from an untrusted cloud with haven," in Proc. 11th USENIX Conf. Oper. Syst. Des. Implement. (OSDI), 2014, pp. 267-283.
-
(2014)
Proc. 11th USENIX Conf. Oper. Syst. Des. Implement. (OSDI)
, pp. 267-283
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
77
-
-
84920378718
-
Big ideas paper: Trustworthy geographically fenced hybrid clouds
-
K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis, and S. Tao, "Big ideas paper: Trustworthy geographically fenced hybrid clouds," in Proc. ACM/IFIP/USENIX Middleware, 2014, pp. 37-48.
-
(2014)
Proc. ACM/IFIP/USENIX Middleware
, pp. 37-48
-
-
Jayaram, K.R.1
Safford, D.2
Sharma, U.3
Naik, V.4
Pendarakis, D.5
Tao, S.6
-
78
-
-
84944314610
-
Scalable attestation: A step toward secure and trusted clouds
-
S. Berger, K. Goldman, D. Pendarakis, D. Safford, E. Valdez, and M. Zohar, "Scalable attestation: A step toward secure and trusted clouds," in Proc. Int. Conf. Cloud Eng. (IC2E), 2015, pp. 185-194.
-
(2015)
Proc. Int. Conf. Cloud Eng. (IC2E)
, pp. 185-194
-
-
Berger, S.1
Goldman, K.2
Pendarakis, D.3
Safford, D.4
Valdez, E.5
Zohar, M.6
-
79
-
-
85076688797
-
φbox: A platform for privacy-preserving apps
-
S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov, "φBox: A platform for privacy-preserving apps," in Proc. 10th USENIX Symp. Netw. Syst. Des. Implement., 2013, pp. 501-514.
-
(2013)
Proc. 10th USENIX Symp. Netw. Syst. Des. Implement
, pp. 501-514
-
-
Lee, S.1
Wong, E.L.2
Goel, D.3
Dahlin, M.4
Shmatikov, V.5
-
80
-
-
85076289299
-
XBook: Redesigning privacy control in social networking platforms
-
K. Singh, S. Bhola, and W. Lee, "xBook: Redesigning privacy control in social networking platforms," in Proc. USENIX Secur. Symp., 2009, pp. 249-266.
-
(2009)
Proc. USENIX Secur. Symp
, pp. 249-266
-
-
Singh, K.1
Bhola, S.2
Lee, W.3
-
81
-
-
84958754081
-
Cloud forensics
-
New York, NY, USA: Springer
-
K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, "Cloud forensics," in Advances in Digital Forensics VII. New York, NY, USA: Springer, 2011, pp. 35-46.
-
(2011)
Advances in Digital Forensics VII
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
82
-
-
77955961955
-
A case for the accountable cloud
-
A. Haeberlen, "A case for the accountable cloud," SIGOPS Oper. Syst. Rev., vol. 44, no. 2, pp. 52-57, 2010.
-
(2010)
SIGOPS Oper. Syst. Rev
, vol.44
, Issue.2
, pp. 52-57
-
-
Haeberlen, A.1
-
83
-
-
83455220824
-
A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures
-
P. Massonet, S. Naqvi, C. Ponsard, J. Latanicki, B. Rochwerger, and M. Villari, "A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures," in Proc. Int. Symp. Parallel Distrib. Process. Workshops PhD Forum (IPDPSW), 2011, pp. 1510-1517.
-
(2011)
Proc. Int. Symp. Parallel Distrib. Process. Workshops PhD Forum (IPDPSW)
, pp. 1510-1517
-
-
Massonet, P.1
Naqvi, S.2
Ponsard, C.3
Latanicki, J.4
Rochwerger, B.5
Villari, M.6
-
84
-
-
84969875989
-
-
London, London, U.K., Tech. Rep. 191, 2015 accessed on Jul. 21
-
K. Hon, C. Millard, C. Reed, J. Singh, I. Walden, and J. Crowcroft, Policy, legal and regulatory implications of a Europe-only cloud, School of Law, Queen Mary Univ. London, London, U.K., Tech. Rep. 191, 2015 [Online]. Available: http://papers.ssrn.com/sol3/papers. cfm?abstract-id=2527951, accessed on Jul. 21, 2015.
-
(2015)
Policy, Legal and Regulatory Implications of A Europe-only Cloud, School of Law, Queen Mary Univ
-
-
Hon, K.1
Millard, C.2
Reed, C.3
Singh, J.4
Walden, I.5
Crowcroft, J.6
-
85
-
-
84882776670
-
The cloud needs cross-layer data handling annotations
-
M. Henze, R. Hummen, and K.Wehrle, "The cloud needs cross-layer data handling annotations," in Proc. Secur. Privacy Workshops (SPW), 2013, pp. 18-22.
-
(2013)
Proc. Secur. Privacy Workshops (SPW)
, pp. 18-22
-
-
Henze, M.1
Hummen, R.2
Wehrle, K.3
-
86
-
-
80051934325
-
-
Ph.D. dissertation, Computer Lab., Univ. Cambridge, London, U.K.: Tech. Rep. TR 770
-
J. Singh, "Controlling the dissemination and disclosure of healthcare events," Ph.D. dissertation, Computer Lab., Univ. Cambridge, London, U.K.: Tech. Rep. TR 770, 2009.
-
(2009)
Controlling the Dissemination and Disclosure of Healthcare Events
-
-
Singh, J.1
-
87
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proc. 1st MCC Workshop Mobile Cloud Comput., 2012, pp. 13-16.
-
(2012)
Proc. 1st MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
89
-
-
84883732282
-
Mobile fog: A programming model for large-scale applications on the Internet of Things
-
K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, and B. Koldehofe, "Mobile fog: A programming model for large-scale applications on the Internet of Things," in Proc. 2nd SIGCOMM Workshop Mobile Cloud Comput. (MCC), 2013, pp. 15-20.
-
(2013)
Proc. 2nd SIGCOMM Workshop Mobile Cloud Comput. (MCC)
, pp. 15-20
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwälder, B.4
Koldehofe, B.5
-
90
-
-
19944379841
-
Edgecomputing: Extending enterprise applications to the edge of the internet
-
A. Davis, J. Parikh, and W. E. Weihl, "Edgecomputing: Extending enterprise applications to the edge of the internet," in Proc. 13th Int. World Wide Web Conf. Altern. Track Papers, 2004, pp. 180-187.
-
(2004)
Proc. 13th Int. World Wide Web Conf. Altern. Track Papers
, pp. 180-187
-
-
Davis, A.1
Parikh, J.2
Weihl, W.E.3
-
91
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The case for VM-based cloudlets in mobile computing," IEEE Pervasive Comput., vol. 8, no. 4, pp. 14-23, 2009.
-
(2009)
IEEE Pervasive Comput
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
92
-
-
78751669905
-
Unclouded vision
-
New York, NY, USA: Springer
-
J. Crowcroft, A. Madhavapeddy, M. Schwarzkopf, T. Hong, and R. Mortier, "Unclouded vision," in Distributed Computing and Networking. New York, NY, USA: Springer, 2011, pp. 29-40.
-
(2011)
Distributed Computing and Networking
, pp. 29-40
-
-
Crowcroft, J.1
Madhavapeddy, A.2
Schwarzkopf, M.3
Hong, T.4
Mortier, R.5
-
93
-
-
84891784232
-
Unikernels: The rise of the virtual library operating system
-
A. Madhavapeddy and D. J. Scott, "Unikernels: The rise of the virtual library operating system," Commun. ACM, vol. 57, no. 1, pp. 61-69, 2014.
-
(2014)
Commun. ACM
, vol.57
, Issue.1
, pp. 61-69
-
-
Madhavapeddy, A.1
Scott, D.J.2
-
94
-
-
84903154895
-
Policy enforcement within emerging distributed, event-based systems
-
J. Singh, D. Eyers, and J. Bacon, "Policy enforcement within emerging distributed, event-based systems," in Proc. ACM Distrib. Event Based Syst. (DEBS'14), 2014, pp. 246-255.
-
(2014)
Proc. ACM Distrib. Event Based Syst. (DEBS'14)
, pp. 246-255
-
-
Singh, J.1
Eyers, D.2
Bacon, J.3
-
95
-
-
84942417981
-
Data flow management and compliance in cloud computing
-
to be published
-
J. Singh, J. Powles, T. Pasquier, and J. Bacon, "Data flow management and compliance in cloud computing," IEEE Cloud Comput. Magaz. SI Legal Clouds, 2015, to be published.
-
(2015)
IEEE Cloud Comput. Magaz. SI Legal Clouds
-
-
Singh, J.1
Powles, J.2
Pasquier, T.3
Bacon, J.4
|