-
1
-
-
84915735864
-
Secure data sharing in the cloud
-
Berlin, Germany: Springer-Verlag
-
D. Thilakanathan, S. Chen, S. Nepal, and R. A. Calvo, "Secure data sharing in the cloud, " in Security, Privacy, and Trust in Cloud Systems. Berlin, Germany: Springer-Verlag, 2013, pp. 45-72.
-
(2013)
Security, Privacy, and Trust in Cloud Systems
, pp. 45-72
-
-
Thilakanathan, D.1
Chen, S.2
Nepal, S.3
Calvo, R.A.4
-
3
-
-
84976493222
-
Sharing digital data
-
G. Benedis-Grab, "Sharing digital data, " Sci. Children, vol. 48, no. 8, pp. 42-46, 2011.
-
(2011)
Sci. Children
, vol.48
, Issue.8
, pp. 42-46
-
-
Benedis-Grab, G.1
-
4
-
-
79952720153
-
YouTube: Educational potentials and pitfalls
-
T. Jones and K. Cuthrell, "YouTube: Educational potentials and pitfalls, " Comput. Schools, vol. 28, no. 1, pp. 75-85, 2011.
-
(2011)
Comput. Schools
, vol.28
, Issue.1
, pp. 75-85
-
-
Jones, T.1
Cuthrell, K.2
-
6
-
-
77956327013
-
Using Google wave and docs for group collaboration
-
D. A. Riley, "Using Google wave and docs for group collaboration, " Library Hi Tech News, vol. 27, nos. 4-5, pp. 12-14, 2010.
-
(2010)
Library Hi Tech News
, vol.27
, Issue.4-5
, pp. 12-14
-
-
Riley, D.A.1
-
7
-
-
77953842860
-
Sharing medical data for health research: The early personal health record experience
-
E. R. Weitzman, L. Kaci, and K. D. Mandl, "Sharing medical data for health research: The early personal health record experience, " J. Med. Internet Res., vol. 12, no. 2, p. e14, 2010.
-
(2010)
J. Med. Internet Res
, vol.12
, Issue.2
, pp. 14
-
-
Weitzman, E.R.1
Kaci, L.2
Mandl, K.D.3
-
10
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
mNov./Dec
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments, " IEEE Security Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
11
-
-
77957960367
-
Privacy in the clouds
-
A. Cavoukian, "Privacy in the clouds, " Identity Inf. Soc., vol. 1, no. 1, pp. 89-108, 2008.
-
(2008)
Identity Inf. Soc
, vol.1
, Issue.1
, pp. 89-108
-
-
Cavoukian, A.1
-
12
-
-
80053148753
-
Cloud computing security threats and responses
-
May
-
F. Sabahi, "Cloud computing security threats and responses, " in Proc. IEEE 3rd Int. Conf. Commun. Softw. Netw., May 2011, pp. 245-249.
-
(2011)
Proc IEEE 3rd Int. Conf. Commun. Softw. Netw
, pp. 245-249
-
-
Sabahi, F.1
-
13
-
-
77954947470
-
TrustStore: Making Amazon S3 trustworthy with services composition
-
May
-
J. Yao, S. Chen, S. Nepal, D. Levy, and J. Zic, "TrustStore: Making Amazon S3 trustworthy with services composition, " in Proc. 10th IEEE/ACM Int. Conf. Cluster, Cloud Grid Comput., May 2010, pp. 600-605.
-
(2010)
Proc. 10th IEEE/ACM Int. Conf. Cluster, Cloud Grid Comput
, pp. 600-605
-
-
Yao, J.1
Chen, S.2
Nepal, S.3
Levy, D.4
Zic, J.5
-
14
-
-
84867375385
-
BYOD: Security and privacy considerations
-
K. W. Miller, J. Voas, and G. F. Hurlburt, "BYOD: Security and privacy considerations, " IT Prof., vol. 14, no. 5, pp. 53-55, 2012.
-
(2012)
IT Prof
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
15
-
-
84857696369
-
BYOD: Enabling the chaos
-
G. Thomson, "BYOD: Enabling the chaos, " Netw. Secur., vol. 2012, no. 2, pp. 5-8, 2012. [Online]. Available: http://dx.doi.org/10.1016/S1353-4858(12)70013-2
-
(2012)
Netw. Secur
, vol.2012
, Issue.2
, pp. 5-8
-
-
Thomson, G.1
-
16
-
-
79961133783
-
Research on privacy-preserving cloud storage framework supporting ciphertext retrieval
-
R. Huang, X. Gui, S. Yu, andW. Zhuang, "Research on privacy-preserving cloud storage framework supporting ciphertext retrieval, " in Proc. Int. Conf. Netw. Comput. Inf. Secur., 2011, pp. 93-97.
-
(2011)
Proc. Int. Conf. Netw. Comput. Inf. Secur
, pp. 93-97
-
-
Huang, R.1
Gui, X.2
Yu, S.3
Zhuang, W.4
-
17
-
-
84866350168
-
Privacy and security issues in cloud computing
-
D. Bender, "Privacy and security issues in cloud computing, " in Proc. Comput. Internet Lawyer, 2012, pp. 1-15.
-
(2012)
Proc. Comput. Internet Lawyer
, pp. 1-15
-
-
Bender, D.1
-
18
-
-
84857471315
-
A secure public cloud storage sys-Tem
-
S. Shin, K. Kobara, and H. Imai, "A secure public cloud storage sys-Tem, " in Proc. Int. Conf. Internet Technol. Secured Trans. (ICITST), 2011, pp. 103-109.
-
(2011)
Proc. Int. Conf. Internet Technol. Secured Trans. (ICITST
, pp. 103-109
-
-
Shin, S.1
Kobara, K.2
Imai, H.3
-
19
-
-
84880192224
-
Security and privacy in cloud computing: A survey
-
M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, "Security and privacy in cloud computing: A survey, " in Proc. 6th Int. Conf. Semantics Knowl. Grid (SKG), 2010, pp. 105-112.
-
(2010)
Proc. 6th Int. Conf. Semantics Knowl. Grid (SKG
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
21
-
-
84976492970
-
Play station network: Hackers claim to have 2.2m credit cards
-
[Online]. Available accessed Oct 2012
-
A. Charles. (2011). PlayStation network: Hackers claim to have 2.2m credit cards. The Guardian Technology Blog. [Online]. Available: http://www.guardian.co.uk/technology/blog/2011/apr/29/playstation-network-hackers-credit-cards, accessed Oct. 2012.
-
(2011)
The Guardian Technology Blog
-
-
Charles, A.1
-
22
-
-
84976495513
-
Feds investigate alleged attacks on Gmail accounts
-
accessed Oct 2012
-
L. Whitney. (2011). Feds investigate alleged attacks on Gmail accounts. CNet News. [Online]. Available: http://news.cnet.com/8301-1009-3-20068229-83/feds-investigate-Alleged-Attacks-on-gmail-Accounts, accessed Oct. 2012.
-
(2011)
CNet News
-
-
Whitney, L.1
-
23
-
-
84964307806
-
A mobile and portable trusted computing platform
-
Aug
-
S. Nepal, J. Zic, D. Liu, and J. Jang, "A mobile and portable trusted computing platform, " EURASIP J. Wireless Commun. Netw., vol. 2011, p. 75, Aug. 2011.
-
(2011)
EURASIP J. Wireless Commun. Netw
, vol.2011
, pp. 75
-
-
Nepal, S.1
Zic, J.2
Liu, D.3
Jang, J.4
-
24
-
-
84889958464
-
Implementing a portable trusted environment
-
J. Zic and S. Nepal, "Implementing a portable trusted environment, " in Proc. Future Trust Comput. Conf., 2008, pp. 17-29.
-
(2008)
Proc. Future Trust Comput. Conf
, pp. 17-29
-
-
Zic, J.1
Nepal, S.2
-
25
-
-
38349053303
-
Trust extension device: Providing mobility and portability of trust in cooperative information systems
-
(Lecture Notes in Computer Science), vol. 4803. Berlin, Germany: Springer-Verlag
-
S. Nepal, J. Zic, H. Hwang, and D. Moreland, "Trust extension device: Providing mobility and portability of trust in cooperative information systems, " in On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS (Lecture Notes in Computer Science), vol. 4803. Berlin, Germany: Springer-Verlag, 2007, pp. 253-271
-
(2007)
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS
, pp. 253-271
-
-
Nepal, S.1
Zic, J.2
Hwang, H.3
Moreland, D.4
-
26
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. Adv. Cryptol., 1985, pp. 10-18.
-
(1985)
Proc. Adv. Cryptol
, pp. 10-18
-
-
El Gamal, T.1
-
27
-
-
84951824554
-
Extended proxy-Assisted approach: Achieving revocable-ne-grained encryption of cloud data
-
Vienna, Austria
-
Y.Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, "Extended proxy-Assisted approach: Achieving revocable-ne-grained encryption of cloud data, " in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), Vienna, Austria, 2015, pp. 146-166.
-
(2015)
Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS)
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.-K.R.4
Zhou, J.5
-
28
-
-
84874822744
-
Adaptive data protec-Tion in distributed systems
-
Feb
-
A. C. Squicciarini, G. Petracca, and E. Bertino, "Adaptive data protec-Tion in distributed systems, " in Proc. 3rd ACM Conf. Data Appl. Secur. Privacy (CODASPY), Feb. 2013, pp. 365-376.
-
(2013)
Proc. 3rd ACM Conf. Data Appl. Secur. Privacy (CODASPY
, pp. 365-376
-
-
Squicciarini, A.C.1
Petracca, G.2
Bertino, E.3
-
29
-
-
84869482676
-
A software-hardware architecture for self-protecting data
-
Oct
-
Y.-Y. Chen, P. A. Jamkhedkar, and R. B. Lee, "A software-hardware architecture for self-protecting data, " in Proc. 19th ACM Conf. Comput. Commun. Secur., Oct. 2012, pp. 14-27.
-
(2012)
Proc. 19th ACM Conf. Comput. Commun. Secur
, pp. 14-27
-
-
Chen, Y.-Y.1
Jamkhedkar, P.A.2
Lee, R.B.3
-
30
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
May
-
J. Bethencourt, A. Sahai, and B.Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321-334.
-
(2007)
Proc IEEE Symp. Secur. Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
33
-
-
84897583680
-
A platform for secure monitoring and sharing of generic health data in the cloud
-
Jun
-
D. Thilakanathan, S. Chen, S. Nepal, R. A. Calvo, and L. Alem, "A platform for secure monitoring and sharing of generic health data in the cloud, " Future Generat. Comput. Syst., vol. 35, pp. 102-113, Jun. 2014.
-
(2014)
Future Generat. Comput. Syst
, vol.35
, pp. 102-113
-
-
Thilakanathan, D.1
Chen, S.2
Nepal, S.3
Calvo, R.A.4
Alem, L.5
-
34
-
-
84900374399
-
Secure and controlled sharing of data in distributed computing
-
Dec
-
D. Thilakanathan, S. Chen, S. Nepal, and R. A. Calvo, "Secure and controlled sharing of data in distributed computing, " in Proc. IEEE 16th Int. Conf. Comput. Sci. Eng., Dec. 2013, pp. 825-832.
-
(2013)
Proc IEEE 16th Int. Conf. Comput. Sci. Eng
, pp. 825-832
-
-
Thilakanathan, D.1
Chen, S.2
Nepal, S.3
Calvo, R.A.4
-
35
-
-
34547273527
-
Attribute-based encryption for-ne-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attribute-based encryption for-ne-grained access control of encrypted data, " in Proc. 13th ACMConf. Comput. Commun. Secur. (CCS), 2006, pp. 89-98.
-
(2006)
Proc. 13th ACMConf. Comput. Commun. Secur. (CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
36
-
-
69949166012
-
Identity-based encryption with ef-cient revocation
-
A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with ef-cient revocation, " in Proc. 15th ACM Conf. Comput. Commun. Secur. (CCS), 2008, pp. 417-426.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Secur. (CCS
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
38
-
-
84919832187
-
Secure multiparty data sharing in the cloud using hardware-based TPM devices
-
Jun./Jul
-
D. Thilakanathan, S. Chen, S. Nepal, D. Liu, R. A. Calvo, and J. Zic, "Secure multiparty data sharing in the cloud using hardware-based TPM devices, " in Proc. IEEE 7th CLOUD, Jun./Jul. 2014, pp. 224-231.
-
(2014)
Proc IEEE 7th CLOUD
, pp. 224-231
-
-
Thilakanathan, D.1
Chen, S.2
Nepal, S.3
Liu, D.4
Calvo, R.A.5
Zic, J.6
-
39
-
-
84941205034
-
Self protecting data sharing using generic policies
-
May
-
S. Chen, D. Thilakanathan, D. Xu, S. Nepal, and R. A. Calvo, "Self protecting data sharing using generic policies, " in Proc. 15th IEEE/ACM Int. Symp. Cluster, Cloud Grid Comput. (CCGrid), May 2015, pp. 1197-1200.
-
(2015)
Proc. 15th IEEE/ACM Int. Symp. Cluster, Cloud Grid Comput. (CCGrid
, pp. 1197-1200
-
-
Chen, S.1
Thilakanathan, D.2
Xu, D.3
Nepal, S.4
Calvo, R.A.5
-
40
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Feb
-
L. Wei, H. Zhu, Z. Cao, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
-
(2014)
Inf. Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Jia, W.4
Chen, Y.5
Vasilakos, A.V.6
|