An intrusion tolerant identity provider with user attributes confidentiality
暂无分享,去创建一个
[1] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[2] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[3] Arun Venkataramani,et al. ZZ and the art of practical BFT execution , 2011, EuroSys '11.
[4] Siu-Ming Yiu,et al. SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.
[5] Antonio Puliafito,et al. How to Enhance Cloud Architectures to Enable Cross-Federation , 2010, IEEE CLOUD.
[6] Bernhard Jansen,et al. Architecting Dependable and Secure Systems Using Virtualization , 2007, WADS.
[7] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[8] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[9] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[10] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[11] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[12] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[14] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[15] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[16] Jens Jensen,et al. The CONTRAIL Approach to Cloud Federations , 2012 .
[17] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[20] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[21] Isaac Agudo,et al. BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.
[22] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[23] M. Kunze,et al. Cloud Federation , 2011 .
[24] Rajkumar Buyya,et al. Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..
[25] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.