-
1
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: Towards a cloud definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2008.
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
2
-
-
84860159525
-
Design of security solution to mobile cloud storage
-
New York, NY, USA: Springer
-
X. Yu and Q. Wen, "Design of security solution to mobile cloud storage," in Knowledge Discovery and Data Mining. New York, NY, USA: Springer, 2012, pp. 255-263.
-
(2012)
Knowledge Discovery and Data Mining
, pp. 255-263
-
-
Yu, X.1
Wen, Q.2
-
3
-
-
84864243332
-
Mobile cloud computing
-
D. Huang, "Mobile cloud computing," IEEE COMSOC Multimedia Commun. Techn. Committee E-Letter, vol. 6, no. 10, pp. 27-31, 2011.
-
(2011)
IEEE COMSOC Multimedia Commun. Techn. Committee E-Letter
, vol.6
, Issue.10
, pp. 27-31
-
-
Huang, D.1
-
4
-
-
84866763081
-
Impact of storage acquisition intervals on the cost-efficiency of the private vs. Public storage
-
O. Mazhelis, G. Fazekas, and P. Tyrvainen, "Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage," in Proc. IEEE 5th Int. Conf. Cloud Comput., 2012, pp. 646-653.
-
(2012)
Proc. IEEE 5th Int. Conf. Cloud Comput.
, pp. 646-653
-
-
Mazhelis, O.1
Fazekas, G.2
Tyrvainen, P.3
-
5
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proc. 1st Workshop Virtualization Mobile Comput., 2008, pp. 31-35.
-
(2008)
Proc. 1st Workshop Virtualization Mobile Comput.
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
6
-
-
77951558980
-
When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments
-
J. Oberheide and F. Jahanian, "When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments," in Proc. 11th Workshop Mobile Comput. Syst. Appl., 2010, pp. 43-48.
-
(2010)
Proc. 11th Workshop Mobile Comput. Syst. Appl.
, pp. 43-48
-
-
Oberheide, J.1
Jahanian, F.2
-
7
-
-
0003756969
-
-
San Mateo, CA, USA: Morgan Kaufmann
-
A. A. Moffat, I. H. Witten, and T. C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images. San Mateo, CA, USA: Morgan Kaufmann, 1999.
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Moffat, A.A.1
Witten, I.H.2
Bell, T.C.3
-
8
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Security Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
9
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. Adv. Cryptol.-Eurocrypt, 2004, pp. 506-522.
-
(2004)
Proc. Adv. Cryptol.-Eurocrypt
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
70349110963
-
Zerber+ r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+ r: Top-k retrieval from a confidential index," in Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol., 2009, pp. 439-449.
-
(2009)
Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol.
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
13
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
14
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst., 2010, pp. 253-262.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst.
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
15
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
16
-
-
84904421834
-
Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
-
B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE Conf. Comput. Commun., 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE Conf. Comput. Commun.
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
17
-
-
33747729581
-
Inverted files for text search engines
-
J. Zobel and A. Moffat, "Inverted files for text search engines," ACM Comput. Surveys, vol. 38, no. 2, p. 6, 2006.
-
(2006)
ACM Comput. Surveys
, vol.38
, Issue.2
, pp. 6
-
-
Zobel, J.1
Moffat, A.2
-
18
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2004, pp. 563-574.
-
(2004)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
19
-
-
0141607824
-
Latent Dirichlet allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet allocation," J. Mach. Learn. Res., vol. 3, pp. 993-1022, 2003.
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
20
-
-
77950327510
-
Using tf-idf to determine word relevance in document queries
-
Tech. Rep. 14th, [Online]
-
J. Ramos, "Using tf-idf to determine word relevance in document queries," in Proc. First Instructional Conf. Machine Learning, Tech. Rep. 14th, 2003. [Online]. Available: https://www.cs.rutgers. edu/mlittman/courses/ml03/iCML03/papers/ramos.pdf
-
(2003)
Proc. First Instructional Conf. Machine Learning
-
-
Ramos, J.1
-
21
-
-
0000600049
-
A probabilistic justification for using tf-idf term weighting in information retrieval
-
D. Hiemstra, "A probabilistic justification for using tf-idf term weighting in information retrieval," Int. J. Digital Libraries, vol. 3, no. 2, pp. 131-139, 2000.
-
(2000)
Int. J. Digital Libraries
, vol.3
, Issue.2
, pp. 131-139
-
-
Hiemstra, D.1
-
22
-
-
0000127441
-
Index term weighting
-
K. Jones, "Index term weighting," Inf. Storage Retrieval, vol. 9, no. 11, pp. 619-633, 1973.
-
(1973)
Inf. Storage Retrieval
, vol.9
, Issue.11
, pp. 619-633
-
-
Jones, K.1
-
23
-
-
84871978542
-
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
-
Q. Chai and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers," in Proc. IEEE Int. Conf. Commun., 2012, pp. 917-922.
-
(2012)
Proc. IEEE Int. Conf. Commun.
, pp. 917-922
-
-
Chai, Q.1
Gong, G.2
-
25
-
-
84881537144
-
Toward privacyassured and searchable cloud data storage services
-
Jul./Aug.
-
M. Li, S. Yu, K. Ren, W. Lou, and Y. T. Hou, "Toward privacyassured and searchable cloud data storage services," IEEE Netw., vol. 27, no. 4, pp. 56-62, Jul./Aug. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.4
, pp. 56-62
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
Hou, Y.T.5
-
26
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
27
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE Conf. Comput. Commun., 2011, pp. 829-837.
-
(2011)
Proc. IEEE Conf. Comput. Commun.
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
28
-
-
84855646451
-
Privacy preserving multiple keyword search for confidential investigation of remote forensics
-
S. Hou, T. Uehara, S. Yiu, L. C. Hui, and K. Chow, "Privacy preserving multiple keyword search for confidential investigation of remote forensics," in Proc. 3rd Int. Conf. Multimedia Inf. Netw. Security, 2011, pp. 595-599.
-
(2011)
Proc. 3rd Int. Conf. Multimedia Inf. Netw. Security
, pp. 595-599
-
-
Hou, S.1
Uehara, T.2
Yiu, S.3
Hui, L.C.4
Chow, K.5
-
29
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. Appl. Cryptography Netw. Security, 2004, pp. 31-45.
-
(2004)
Proc. Appl. Cryptography Netw. Security
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
30
-
-
0037213089
-
An information-theoretic perspective of tf-idf measures
-
A. Aizawa, "An information-theoretic perspective of tf-idf measures," Inf. Process. Manage., vol. 39, pp. 45-65, 2003.
-
(2003)
Inf. Process. Manage.
, vol.39
, pp. 45-65
-
-
Aizawa, A.1
-
34
-
-
67650690965
-
Order-preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'neill, "Order-preserving symmetric encryption," in Proc. 28th Annu. Int. Conf. Adv. Cryptol.: Theory Appl. Cryptographic Techn., 2009, pp. 224-241.
-
(2009)
Proc. 28th Annu. Int. Conf. Adv. Cryptol.: Theory Appl. Cryptographic Techn.
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
35
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Proc. 28th Int. Conf. Theory Appl. Cryptographic Techn., 2010, pp. 24-43.
-
(2010)
Proc. 28th Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
37
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard, "Confidentiality-preserving rank-ordered search," in Proc. ACM Workshop Storage Security Survivability, 2007, pp. 7-12.
-
(2007)
Proc. ACM Workshop Storage Security Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.3
Gou, H.4
Varna, A.5
He, S.6
Wu, M.7
Oard, D.8
-
38
-
-
84864128069
-
Efficient and secure ranked multi-keyword search on encrypted cloud data
-
C. Örencik and E. Savaş, "Efficient and secure ranked multi-keyword search on encrypted cloud data," in Proc. Joint EDBT/ICDT Workshops, 2012, pp. 186-195.
-
(2012)
Proc. Joint EDBT/ICDT Workshops
, pp. 186-195
-
-
Örencik, C.1
Savaş, E.2
-
39
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Juels, and A. Oprea, "Hail: A high-availability and integrity layer for cloud storage," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 187-198.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
40
-
-
84875096069
-
Additive order preserving encryption based encrypted documents ranking in secure cloud storage
-
J. Zhang, B. Deng, and X. Li, "Additive order preserving encryption based encrypted documents ranking in secure cloud storage," in Proc. 3rd Int. Conf. Adv. Swarm Intell., 2012, pp. 58-65.
-
(2012)
Proc. 3rd Int. Conf. Adv. Swarm Intell.
, pp. 58-65
-
-
Zhang, J.1
Deng, B.2
Li, X.3
-
41
-
-
77649261628
-
-
Ph.D. dissertation, Department of Computer Science, Stanford Univ., Stanford, CA, USA
-
C. Gentry, "A fully homomorphic encryption scheme," Ph.D. dissertation, Department of Computer Science, Stanford Univ., Stanford, CA, USA, 2009.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
43
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar and Y. Lu, "Cloud computing for mobile users: Can offloading computation save energy?" Computer, vol. 43, no. 4, pp. 51-56, 2010.
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.2
-
46
-
-
85027551307
-
-
[Online]
-
Wikipedia. (2015). [Online]. Available: http://en.wikipedia.org/ wiki/tf-idf
-
(2015)
-
-
-
47
-
-
0002848777
-
Exploring the similarity space
-
J. Zobel and A. Moffat, "Exploring the similarity space," ACM SIGIR Forum, vol. 32, no. 1, pp. 18-34, 1998.
-
(1998)
ACM SIGIR Forum
, vol.32
, Issue.1
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
-
48
-
-
84942688203
-
Demo: Phone power monitoring with battor
-
A. Schulman, T. Schmid, P. Dutta, and N. Spring, "Demo: Phone power monitoring with battor," in Proc. Annu. ACM Int. Conf. Mobile Comput. Netw., vol. 11, 2011.
-
(2011)
Proc. Annu. ACM Int. Conf. Mobile Comput. Netw.
, vol.11
-
-
Schulman, A.1
Schmid, T.2
Dutta, P.3
Spring, N.4
|