TCLOUD: A Trusted Storage Architecture for Cloud Computing
暂无分享,去创建一个
[1] Jinjun Chen,et al. An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[2] Eric Pardede,et al. MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[3] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[4] Zhidong Shen,et al. The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.
[5] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[6] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[7] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[8] Feng Zhou,et al. TCLOUD: A Reliable Data Storage Architecture for Cloud Computing , 2013 .
[9] X. U. Chun-xiang,et al. Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing , 2012, IACR Cryptol. ePrint Arch..
[10] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[11] Ashish G. Revar,et al. Securing user authentication using single sign-on in Cloud Computing , 2011, 2011 Nirma University International Conference on Engineering.
[12] Xuefeng Zheng,et al. TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing , 2013 .
[13] Guiran Chang,et al. A Trust Management Model to Enhance Security of Cloud Computing Environments , 2011, 2011 Second International Conference on Networking and Distributed Computing.
[14] Weiyi Zhang,et al. A secured cost-effective multi-cloud storage in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[15] Feng Zhou,et al. TCLOUD: Inter - Node Communication Model Based on Social Trust Framework for Cloud Computing , 2013 .
[16] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[17] Raman Maini,et al. COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .
[18] Xuefeng Zheng,et al. Cloud Computing: a Prologue , 2013, ArXiv.
[19] Saikat Guha,et al. Privad: Practical Privacy in Online Advertising , 2011, NSDI.
[20] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[21] Xuefeng Zheng,et al. TCLOUD: Challenges and Best Practices for Cloud Computing , 2013, ArXiv.