메뉴 건너뛰기




Volumn 5, Issue 4, 2013, Pages 97-112

Maintaining User Control While Storing and Processing Sensor Data in the Cloud

Author keywords

Access Control; Architecture; Cloud; End to End Protection; Platform; Security; Sensor Network

Indexed keywords


EID: 85001608959     PISSN: 19380259     EISSN: 19380267     Source Type: Journal    
DOI: 10.4018/ijghpc.2013100107     Document Type: Article
Times cited : (21)

References (34)
  • 2
    • 84895529412 scopus 로고    scopus 로고
    • Retrieved April 10, 2013, from http://aws.amazon.com/en/ec2/instance-types/
    • Amazon Web Services. (2013). Amazon EC2 instance types. Retrieved April 10, 2013, from http://aws.amazon.com/en/ec2/instance-types/
    • (2013) Amazon EC2 instance types
  • 8
    • 33745212646 scopus 로고    scopus 로고
    • Performance analysis of TLS web servers. [TOCS]
    • 10.1145/1124153.1124155
    • Coarfa C., Druschel P., Wallach D. S. (2006). Performance analysis of TLS web servers. [TOCS]. ACM Transactions on Computer Systems, 24(1), 39–69. 10.1145/1124153.1124155
    • (2006) ACM Transactions on Computer Systems , vol.24 , Issue.1 , pp. 39-69
    • Coarfa, C.1    Druschel, P.2    Wallach, D.S.3
  • 9
    • 70450170255 scopus 로고    scopus 로고
    • The application/json media type for JavaScript object notation (JSON)
    • Informational
    • Crockford D. (2006). The application/json media type for JavaScript object notation (JSON). Internet Engineering Taskforce RFC 4627. Informational.
    • (2006) Internet Engineering Taskforce RFC 4627
    • Crockford, D.1
  • 13
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • 10.1145/1666420.1666444
    • Gentry C. (2010). Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3), 97–105. 10.1145/1666420.1666444
    • (2010) Communications of the ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 22
    • 78650558794 scopus 로고    scopus 로고
    • Secure virtualization for cloud computing
    • 10.1016/j.jnca.2010.06.008
    • Lombardi F., Di Pietro R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113–1122. 10.1016/j.jnca.2010.06.008
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.4 , pp. 1113-1122
    • Lombardi, F.1    Di Pietro, R.2
  • 24
    • 65349177152 scopus 로고    scopus 로고
    • Security benchmarks of OSGi platforms: Toward hardened OSGi
    • 10.1002/spe.906
    • Parrend P., Frenot S. (2009). Security benchmarks of OSGi platforms: Toward hardened OSGi. Software, Practice & Experience, 39(5), 471–499. 10.1002/spe.906
    • (2009) Software, Practice & Experience , vol.39 , Issue.5 , pp. 471-499
    • Parrend, P.1    Frenot, S.2
  • 33
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • 10.1109/TPDS.2010.183
    • Wang Q., Wang C., Ren K., Lou W., Li J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859. 10.1109/TPDS.2010.183
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.