-
1
-
-
84906355819
-
Business and government organizations’ adoption of cloud computing
-
Springer Berlin, Heidelberg
-
Charif, B., Awad, A., Business and government organizations’ adoption of cloud computing. Intelligent Data Engineering and Automated Learning, IDEAL 2014, 2014, Springer, Berlin, Heidelberg, 492–501.
-
(2014)
Intelligent Data Engineering and Automated Learning, IDEAL 2014
, pp. 492-501
-
-
Charif, B.1
Awad, A.2
-
2
-
-
84944064003
-
Performance evaluation of cloud services with profit optimization
-
Jaiganesh, M., Ramadoss, B., Vincent Antony Kumar, A., Mercy, S., Performance evaluation of cloud services with profit optimization. Procedia Comput. Sci. 54 (2015), 24–30.
-
(2015)
Procedia Comput. Sci.
, vol.54
, pp. 24-30
-
-
Jaiganesh, M.1
Ramadoss, B.2
Vincent Antony Kumar, A.3
Mercy, S.4
-
3
-
-
84894028300
-
Secure role based data access control in cloud computing
-
Preiya, V., Pavithra, R., Joshi, D., Secure role based data access control in cloud computing. Int. J. Comput. Trends Technol. 1:2 (2011), 146–151.
-
(2011)
Int. J. Comput. Trends Technol.
, vol.1
, Issue.2
, pp. 146-151
-
-
Preiya, V.1
Pavithra, R.2
Joshi, D.3
-
4
-
-
84953720896
-
Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing
-
IEEE Computer Society
-
Deng, R., Lu, R., Lai, C., Luan, T., Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. Proceedings of the IEEE International Conference on Communications, 2015, IEEE Computer Society, 3909–3914.
-
(2015)
Proceedings of the IEEE International Conference on Communications
, pp. 3909-3914
-
-
Deng, R.1
Lu, R.2
Lai, C.3
Luan, T.4
-
5
-
-
84963775775
-
Ehopes: data-centered fog platform for smart living
-
IEEE Computer Society
-
Li, J., Jin, J., Yuan, D., Palaniswami, M., Moessner, K., Ehopes: data-centered fog platform for smart living. Proceedings of the 2015 International Telecommunication Networks and Applications Conference, 2015, IEEE Computer Society, 308–313.
-
(2015)
Proceedings of the 2015 International Telecommunication Networks and Applications Conference
, pp. 308-313
-
-
Li, J.1
Jin, J.2
Yuan, D.3
Palaniswami, M.4
Moessner, K.5
-
6
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
ACM
-
Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the Internet of things. Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, ACM, 13–16.
-
(2012)
Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
7
-
-
84951050684
-
A survey of fog computing: concepts, applications and issues
-
ACM
-
Yi, S., Li, C., Li, Q., A survey of fog computing: concepts, applications and issues. Proceedings of the 2015 Workshop on Mobile Big Data, 2015, ACM, 37–42.
-
(2015)
Proceedings of the 2015 Workshop on Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
8
-
-
84928596525
-
An overview of fog computing and its security issues
-
Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput.: Pract. Exper. 28:10 (2016), 2991–3005, 10.1016/j.future.2016.08.018.
-
(2016)
Concurr. Comput.: Pract. Exper.
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
9
-
-
84912130127
-
The fog computing paradigm: scenarios and security issues
-
IEEE Computer Society
-
Stojmenovic, I., Wen, S., The fog computing paradigm: scenarios and security issues. Proceedings of the Federated Conference on Computer Science and Information Systems, 2014, IEEE Computer Society, 1–8.
-
(2014)
Proceedings of the Federated Conference on Computer Science and Information Systems
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
10
-
-
84964426683
-
Exploiting lte d2d communications in m2m fog platforms: deployment and practical issues
-
IEEE Computer Society
-
Vallati, C., Virdis, A., Mingozzi, E., Stea, G., Exploiting lte d2d communications in m2m fog platforms: deployment and practical issues. Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things, 2015, IEEE Computer Society, 585–590.
-
(2015)
Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things
, pp. 585-590
-
-
Vallati, C.1
Virdis, A.2
Mingozzi, E.3
Stea, G.4
-
11
-
-
84943612463
-
Security and privacy issues of fog computing: a survey
-
Springer Berlin, Heidelberg
-
Yi, S., Qin, Z., Li, Q., Security and privacy issues of fog computing: a survey. Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, 2015, Springer, Berlin, Heidelberg, 685–695.
-
(2015)
Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
12
-
-
84856897107
-
Cloud computing: challenges and future directions
-
Choo, K., Cloud computing: challenges and future directions. Trends Issues Crime Criminal Justice 400 (2010), 1–6.
-
(2010)
Trends Issues Crime Criminal Justice
, vol.400
, pp. 1-6
-
-
Choo, K.1
-
13
-
-
84991042624
-
Cloud cryptography: theory, practice and future research directions
-
Choo, K., Domingo-Ferrer, J., Zhang, L., Cloud cryptography: theory, practice and future research directions. Future Gener. Comput. Syst. 62:C (2016), 51–53.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, Issue.100
, pp. 51-53
-
-
Choo, K.1
Domingo-Ferrer, J.2
Zhang, L.3
-
14
-
-
85011018181
-
Attribute-based data access control in mobile cloud computing: taxonomy and open issues
-
Sookhak, M., Yu, F., Khan, M., Xiang, Y., Buyya, R., Attribute-based data access control in mobile cloud computing: taxonomy and open issues. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.08.018.
-
(2016)
Future Gener. Comput. Syst.
-
-
Sookhak, M.1
Yu, F.2
Khan, M.3
Xiang, Y.4
Buyya, R.5
-
15
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
Springer Berlin, Heidelberg
-
Yang, Y., Liu, J., Liang, K., Choo, K., Zhou, J., Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. ESORICS, 2015, Springer, Berlin, Heidelberg, 146–166.
-
(2015)
ESORICS
, pp. 146-166
-
-
Yang, Y.1
Liu, J.2
Liang, K.3
Choo, K.4
Zhou, J.5
-
16
-
-
34548731375
-
Ciphertext policy attribute-based encryption
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., Waters, B., Ciphertext policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007, IEEE Computer Society, 321–334, 10.1109/SP.2007.11.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
45749116552
-
Provably secure ciphertext policy abe
-
ACM
-
Cheung, L., Newport, C., Provably secure ciphertext policy abe. Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, 2007, ACM, 456–465, 10.1145/1315245.1315302.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
18
-
-
84922031792
-
Attribute-based encryption optimized for cloud computing
-
Springer Berlin, Heidelberg
-
Horvath, M., Attribute-based encryption optimized for cloud computing. SOFSEM 2015: Theory and Practice of Computer Science, Vol. 8939, 2015, Springer, Berlin, Heidelberg, 566–577, 10.1007/978-3-662-46078-8_47.
-
(2015)
SOFSEM 2015: Theory and Practice of Computer Science, Vol. 8939
, pp. 566-577
-
-
Horvath, M.1
-
19
-
-
84883281346
-
Improving security and efficiency in attribute-based data sharing
-
Hur, J., Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25:10 (2013), 2271–2282.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.10
, pp. 2271-2282
-
-
Hur, J.1
-
20
-
-
84938701752
-
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
-
Liang, K., Susilo, W., Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10:9 (2015), 1981–1992.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.9
, pp. 1981-1992
-
-
Liang, K.1
Susilo, W.2
-
21
-
-
84933040096
-
Privacy-preserving ciphertext multi-sharing control for big data storage
-
Liang, K., Susilo, W., Liu, J., Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10:8 (2015), 1578–1589.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.8
, pp. 1578-1589
-
-
Liang, K.1
Susilo, W.2
Liu, J.3
-
22
-
-
84906492583
-
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
-
Springer Berlin, Heidelberg
-
Liang, K., Liu, J., Wong, D., Susilo, W., An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. ESORICS, 2014, Springer, Berlin, Heidelberg, 257–272.
-
(2014)
ESORICS
, pp. 257-272
-
-
Liang, K.1
Liu, J.2
Wong, D.3
Susilo, W.4
-
23
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K., Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
-
(2016)
Pervasive Mob. Comput.
, vol.28
, pp. 122-134
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Choo, K.6
-
24
-
-
84963972226
-
An efficient file hierarchy attribute-based encryption scheme in cloud computing
-
Wang, S., Zhou, J., Yu, J., Joseph, K., Chen, J., Xie, W., An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11:6 (2016), 1265–1277.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.6
, pp. 1265-1277
-
-
Wang, S.1
Zhou, J.2
Yu, J.3
Joseph, K.4
Chen, J.5
Xie, W.6
-
25
-
-
84969919785
-
Attribute-based data sharing scheme revisited in cloud computing
-
Wang, S., Liang, K., Joseph, K., Chen, J., Yu, J., Xie, W., Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11:8 (2016), 1661–1673.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.8
, pp. 1661-1673
-
-
Wang, S.1
Liang, K.2
Joseph, K.3
Chen, J.4
Yu, J.5
Xie, W.6
-
26
-
-
85076484262
-
Outsourcing the decryption of abe ciphertext
-
USENIX Association
-
Green, M., Hohenberger, S., Water, B., Outsourcing the decryption of abe ciphertext. Proceedings of the 20th USENIX Conference on Security, 2011, USENIX Association, 34.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Water, B.3
-
27
-
-
84872074603
-
Efficient and secure data storage operations for mobile cloud computing
-
IEEE Computer Society
-
Zhou, Z., Huang, D., Efficient and secure data storage operations for mobile cloud computing. Proceedings of the 8th International Conference on Network and Service Management and 2012 Workshop on Systems Proceedings of the Virtualiztion Management, 2011, IEEE Computer Society, 37–45.
-
(2011)
Proceedings of the 8th International Conference on Network and Service Management and 2012 Workshop on Systems Proceedings of the Virtualiztion Management
, pp. 37-45
-
-
Zhou, Z.1
Huang, D.2
-
28
-
-
85001013370
-
Attribute-based encryption with encryption and decryption outsourcing
-
M. Asim, M. Petkovic, T. Ignatenko, Attribute-based encryption with encryption and decryption outsourcing, in: Proceedings of the 19th Conference on Innovations in Clouds, Internet and Networks, 2014, pp. 21–28.
-
(2014)
Proceedings of the 19th Conference on Innovations in Clouds, Internet and Networks
, pp. 21-28
-
-
Asim, M.1
Petkovic, M.2
Ignatenko, T.3
-
29
-
-
84985919305
-
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
-
Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J., Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure 13:5 (2016), 533–546.
-
(2016)
IEEE Trans. Dependable Secure
, vol.13
, Issue.5
, pp. 533-546
-
-
Mao, X.1
Lai, J.2
Mei, Q.3
Chen, K.4
Weng, J.5
-
30
-
-
85018968480
-
A cloud-based access control scheme with user revocation and attribute update
-
Springer Berlin, Heidelberg
-
Zhang, P., Chen, Z., Liang, K., Wang, S., Wang, T., A cloud-based access control scheme with user revocation and attribute update. Proceedings of the 21st Australasian Conference on Information Security and Privacy, 2016, Springer, Berlin, Heidelberg, 1–16.
-
(2016)
Proceedings of the 21st Australasian Conference on Information Security and Privacy
, pp. 1-16
-
-
Zhang, P.1
Chen, Z.2
Liang, K.3
Wang, S.4
Wang, T.5
-
31
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
-
Springer Berlin, Heidelberg
-
Waters, B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Proceedings of the 4th International Conference on Practice and Theory in Public Key Cryptography, 2011, Springer, Berlin, Heidelberg, 53–70.
-
(2011)
Proceedings of the 4th International Conference on Practice and Theory in Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
32
-
-
80052701910
-
Jpbc: java pairing based cryptography
-
IEEE Computer Society
-
Caro, A., Iovino, V., Jpbc: java pairing based cryptography. IEEE Symposium on Computers and Communications, 2011, IEEE Computer Society, 850–855.
-
(2011)
IEEE Symposium on Computers and Communications
, pp. 850-855
-
-
Caro, A.1
Iovino, V.2
|