-
1
-
-
0036688074
-
A survey on sensor networks
-
10.1109/MCOM.2002.1024422
-
Akyildiz I., Su W., Sankarasubramaniam Y., Cayirci E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114. 10.1109/MCOM.2002.1024422
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84895529412
-
-
Retrieved April 10, 2013, from http://aws.amazon.com/en/ec2/instance-types/
-
Amazon Web Services. (2013). Amazon EC2 instance types. Retrieved April 10, 2013, from http://aws.amazon.com/en/ec2/instance-types/
-
(2013)
Amazon EC2 instance types
-
-
-
3
-
-
33751508709
-
-
National Institute of Standards and Technology, NIST Special Publication 800–57
-
Barker, E., Barker, W., Burr, W., Polk, W., & Smid M. (2012). Recommendation for key management #– Part 1: General (Revision 3). National Institute of Standards and Technology, NIST Special Publication 800–57.
-
(2012)
Recommendation for key management #– Part 1: General (Revision 3)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
6
-
-
84906814025
-
Twin clouds: Secure cloud computing with low latency
-
Bugiel, S., N#ürnberger, S., Sadeghi, A.-R., & Schneider, T. (2011). Twin clouds: Secure cloud computing with low latency. In Proceedings 12th Joint IFIP TC6 and TC11 Conference Communications and Multimedia Security (CMS 2011).
-
(2011)
Proceedings 12th Joint IFIP TC6 and TC11 Conference Communications and Multimedia Security (CMS 2011)
-
-
Bugiel, S.1
N#ürnberger, S.2
Sadeghi, A.-R.3
Schneider, T.4
-
7
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009).
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009)
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
8
-
-
33745212646
-
Performance analysis of TLS web servers. [TOCS]
-
10.1145/1124153.1124155
-
Coarfa C., Druschel P., Wallach D. S. (2006). Performance analysis of TLS web servers. [TOCS]. ACM Transactions on Computer Systems, 24(1), 39–69. 10.1145/1124153.1124155
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.1
, pp. 39-69
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.S.3
-
9
-
-
70450170255
-
The application/json media type for JavaScript object notation (JSON)
-
Informational
-
Crockford D. (2006). The application/json media type for JavaScript object notation (JSON). Internet Engineering Taskforce RFC 4627. Informational.
-
(2006)
Internet Engineering Taskforce RFC 4627
-
-
Crockford, D.1
-
13
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
10.1145/1666420.1666444
-
Gentry C. (2010). Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3), 97–105. 10.1145/1666420.1666444
-
(2010)
Communications of the ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
14
-
-
70450078398
-
I-JVM: A Java virtual machine for component isolation in OSGi
-
Geoffray, N., Thomas, G., Muller, G., Parrend, P., Fr#énot, S., & Folliot, B. (2009) I-JVM: A Java virtual machine for component isolation in OSGi. In Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009).
-
(2009)
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009)
-
-
Geoffray, N.1
Thomas, G.2
Muller, G.3
Parrend, P.4
Fr#énot, S.5
Folliot, B.6
-
17
-
-
84874277715
-
A cloud design for user-controlled storage and processing of sensor data
-
Hummen, R., Henze, M., Catrein, D., & Wehrle, K. (2012). A cloud design for user-controlled storage and processing of sensor data. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012).
-
(2012)
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)
-
-
Hummen, R.1
Henze, M.2
Catrein, D.3
Wehrle, K.4
-
18
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
Itani, W., Kayssi, A., & Chehab, A. (2009). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In Proceedings 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2009).
-
(2009)
Proceedings 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2009)
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
22
-
-
78650558794
-
Secure virtualization for cloud computing
-
10.1016/j.jnca.2010.06.008
-
Lombardi F., Di Pietro R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113–1122. 10.1016/j.jnca.2010.06.008
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
23
-
-
85077134302
-
Cloud terminal: Secure access to sensitive applications from untrusted systems
-
Martignoni, L., Poosankam, P., Zaharia, M., Han, J., McCamant, S., & Song, D., Stoica, I. (2012). Cloud terminal: Secure access to sensitive applications from untrusted systems. In Proceedings of the 2012 USENIX Annual Technical Conference (ATC 2012).
-
(2012)
Proceedings of the 2012 USENIX Annual Technical Conference (ATC 2012)
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Stoica, I.7
-
24
-
-
65349177152
-
Security benchmarks of OSGi platforms: Toward hardened OSGi
-
10.1002/spe.906
-
Parrend P., Frenot S. (2009). Security benchmarks of OSGi platforms: Toward hardened OSGi. Software, Practice & Experience, 39(5), 471–499. 10.1002/spe.906
-
(2009)
Software, Practice & Experience
, vol.39
, Issue.5
, pp. 471-499
-
-
Parrend, P.1
Frenot, S.2
-
26
-
-
84863151459
-
End-to-end policy-based encryption and management of data in the cloud
-
Pearson, S., Mont, M., Chen, L., & Reed, A. (2011). End-to-end policy-based encryption and management of data in the cloud. In Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011).
-
(2011)
Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011)
-
-
Pearson, S.1
Mont, M.2
Chen, L.3
Reed, A.4
-
27
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
Popa, R. A., Redfield, C. M. S., Zeldovich, N., & Balakrishnan, H. (2011). CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP 2011).
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP 2011)
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
28
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
30
-
-
85072933898
-
Adapting software fault isolation to contemporary CPU architectures
-
Sehr, D., Muth, R., Biffle, C., Khimenko, V., Pasko, E., & Schimpf, K., Chen, B. (2010). Adapting software fault isolation to contemporary CPU architectures. In Proceedings of the 19th USENIX Conference on Security (Security 2010).
-
(2010)
Proceedings of the 19th USENIX Conference on Security (Security 2010)
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Chen, B.7
-
32
-
-
84857166447
-
myTrustedCloud: Trusted cloud infrastructure for security-critical computation and data management
-
Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Martin, A., Raun, A., & McMoran, A. (2011) myTrustedCloud: Trusted cloud infrastructure for security-critical computation and data management. In Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011).
-
(2011)
Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011)
-
-
Wallom, D.1
Turilli, M.2
Taylor, G.3
Hargreaves, N.4
Martin, A.5
Raun, A.6
McMoran, A.7
-
33
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
10.1109/TPDS.2010.183
-
Wang Q., Wang C., Ren K., Lou W., Li J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859. 10.1109/TPDS.2010.183
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
34
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Zhang, Y., Juels, A., Reiter, M. K., & Ristenpart, T. (2012). Cross-VM side channels and their use to extract private keys. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012).
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012)
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|