-
1
-
-
63649117166
-
-
Amsterdam, The Netherlands, The Netherlands: Elsevier Science Publishers B. V.
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. vol. 25. Amsterdam, The Netherlands, The Netherlands: Elsevier Science Publishers B. V.; 2009. p. 599-616. Available from: http://portal.acm.org/citation.cfm?id=1528937.1529211.
-
(2009)
Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
2
-
-
77950347409
-
A view of cloud computing
-
April
-
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, et al. A view of cloud computing. Commun ACM. 2010 April; 53:50-58. Available from: http://doi.acm.org/10.1145/1721654.1721672. doi: 10.1145/1721654.1721672
-
(2010)
Commun ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
-
3
-
-
56349150824
-
-
Department of Computer Science and Software Engineering (CSSE), The University of Melbourne, Australia. He
-
Buyya R, Yeo CS, Venugopal S. Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities, in. In: Department of Computer Science and Software Engineering (CSSE), The University of Melbourne, Australia. He; 2008. p. 10-1016.
-
(2008)
Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
, pp. 10-1016
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
4
-
-
77956368863
-
-
1st ed. New York, NY, USA: McGraw-Hill, Inc.
-
Velte T, Velte A, Elsenpeter R. Cloud Computing, A Practical Approach. 1st ed. New York, NY, USA: McGraw-Hill, Inc.; 2010.
-
(2010)
Cloud Computing, a Practical Approach
-
-
Velte, T.1
Velte, A.2
Elsenpeter, R.3
-
5
-
-
84864861672
-
-
Available from: http://dl.acm.org/citation.cfm?id=1833515.1833621
-
Archer J, Cullinane D, Puhlmann N, Boehme A, Kurtz P, Reavis J. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0; 2011. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf. Available from: http://dl.acm.org/citation.cfm?id=1833515.1833621.
-
(2011)
Security Guidance for Critical Areas of Focus in Cloud Computing V3.0
-
-
Archer, J.1
Cullinane, D.2
Puhlmann, N.3
Boehme, A.4
Kurtz, P.5
Reavis, J.6
-
6
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security. CCS'09. New York, NY, USA: ACM; 2009. p. 199-212. Available from: http://doi.acm.org/10.1145/1653662.1653687.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS'09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
7
-
-
70349309706
-
Data Security in the World of Cloud Computing
-
July
-
Kaufman LM. Data Security in the World of Cloud Computing. IEEE Security and Privacy. 2009 July; 7:61-64. Available from: http://dl.acm.org/citation.cfm?id=1591890.1592198. doi: 10.1109/MSP.2009.87
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 61-64
-
-
Kaufman, L.M.1
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
New York, NY, USA: ACM
-
Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD international conference on Management of data. SIGMOD'02. New York, NY, USA: ACM; 2002. p. 216-227. Available from: http://doi.acm.org/10.1145/564691.564717.
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. SIGMOD'02
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
9
-
-
84860377061
-
Privacy enhanced data outsourcing in the cloud
-
Zhou M, Mu Y, Susilo W, Yan J, Dong L. Privacy enhanced data outsourcing in the cloud. Journal of Network and Computer Applications. 2012; 35(4):1367-1373. Available from: http://www.sciencedirect.com/science/article/pii/S1084804512000367. doi: 10.1016/j.jnca.2012.01.022
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.4
, pp. 1367-1373
-
-
Zhou, M.1
Mu, Y.2
Susilo, W.3
Yan, J.4
Dong, L.5
-
12
-
-
80051880293
-
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
-
Li M, Yu S, Cao N, Lou W. Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In: Distributed Computing Systems (ICDCS), 2011 31st International Conference on; 2011. p. 383-392.
-
(2011)
Distributed Computing Systems (ICDCS), 2011 31st International Conference on
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
16
-
-
72449208663
-
Hierarchical Predicate Encryption for Inner-Products
-
Matsui M, editor. Advances in Cryptology- ASIACRYPT 2009. Springer Berlin Heidelberg
-
Okamoto T, Takashima K. Hierarchical Predicate Encryption for Inner-Products. In: Matsui M, editor. Advances in Cryptology- ASIACRYPT 2009. vol. 5912 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2009. p. 214-231. Available from: http://dx.doi.org/10.1007/978-3-642-10366-7-13.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
17
-
-
77955905009
-
Secure Ranked Keyword Search over Encrypted Cloud Data
-
Wang C, Cao N, Li J, Ren K, Lou W. Secure Ranked Keyword Search over Encrypted Cloud Data. In: Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on; 2010. p. 253-262.
-
(2010)
Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
19
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
New York, NY, USA: ACM
-
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS'13. New York, NY, USA: ACM; 2013. p. 71-82. Available from: http://doi.acm.org/10.1145/2484313.2484322.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ASIA CCS'13
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
-
20
-
-
84884520767
-
-
Springer US
-
Pervez Z, Awan A, Khattak A, Lee S, Huh EN. Privacy-aware searching with oblivious term matching for cloud storage. vol. 63. Springer US; 2013. p. 538-560. Available from: http://dx.doi.org/10.1007/s11227-012-0829-z.
-
(2013)
Privacy-aware Searching with Oblivious Term Matching for Cloud Storage
, vol.63
, pp. 538-560
-
-
Pervez, Z.1
Awan, A.2
Khattak, A.3
Lee, S.4
Huh, E.N.5
-
21
-
-
84990186083
-
-
Google Search Appliance.; 2013. Available from: http://www.google.co.uk/enterprise/search/gsa.html.
-
(2013)
Google Search Appliance
-
-
-
22
-
-
84990172958
-
-
Enterprise Search Server Solutions.; 2013. http://sharepoint.microsoft.com/en-us/product/capabilities/search/Pages/Search-Server.aspx.
-
(2013)
Enterprise Search Server Solutions
-
-
-
23
-
-
84925452156
-
Search-as-a-service: Outsourced search over outsourced storage
-
September
-
Singh A, Srivatsa M, Liu L. Search-as-a-service: Outsourced search over outsourced storage. ACM Trans Web. 2009 September; 3:13:1-13:33.
-
(2009)
ACM Trans Web
, vol.3
, pp. 13:1-13:33
-
-
Singh, A.1
Srivatsa, M.2
Liu, L.3
-
24
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY, USA: ACM
-
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. CCS'06. New York, NY, USA: ACM; 2006. p. 89-98. Available from: http://doi.acm.org/10.1145/1180405.1180418.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS'06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
25
-
-
77956137294
-
Cryptographic Cloud Storage
-
Financial Cryptography and Data Security
-
Kamara S, Lauter K. Cryptographic Cloud Storage. In: Financial Cryptography and Data Security. vol. 6054 of Lecture Notes in Computer Science; 2010. p. 136-149.
-
(2010)
Lecture Notes in Computer Science
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
26
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
Wang C, Wang Q, Ren K, Lou W. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: INFOCOM, 2010 Proceedings IEEE; 2010. p. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
27
-
-
84865638715
-
SAPDS: Self-healing attribute-based privacy aware data sharing in cloud
-
Pervez Z, Khattak AM, Lee S, Lee YK. SAPDS: self-healing attribute-based privacy aware data sharing in cloud. The Journal of Supercomputing. 2012; 62(1):431-460. doi: 10.1007/s11227-011-0727-9
-
(2012)
The Journal of Supercomputing
, vol.62
, Issue.1
, pp. 431-460
-
-
Pervez, Z.1
Khattak, A.M.2
Lee, S.3
Lee, Y.K.4
-
28
-
-
84960322631
-
-
Lucene. Apache Lucene Core; 2013. http://lucene.apache.org/core/.
-
(2013)
Apache Lucene Core
-
-
|