AN OVERVIEW OF PRIVACY SCHEME IN CLOUD COMPUTING
暂无分享,去创建一个
[1] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[2] Rahul Malhotra,et al. Study and Comparison of Various Cloud Simulators Available in the Cloud Computing , 2013 .
[3] John Kim,et al. High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities , 2011, High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities.
[4] Gregory R. Andrews,et al. Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.
[5] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[6] Hai Jin,et al. A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.
[7] César Augusto Biancolino,et al. Cloud Computing and Information Technology Strategy , 2013 .
[8] K. Govinda,et al. Agent Based Security for Cloud Computing using Obfuscation , 2012 .
[9] Abdul Ghafoor Abbasi,et al. Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.
[10] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[11] P. Dhavachelvan,et al. A privacy breach preventing and mitigation methodology for cloud service data storage , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[12] Jie Wu,et al. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.