A Study on Data Storage Security Issues in Cloud Computing
暂无分享,去创建一个
[1] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[2] K. S. Naidu,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2017 .
[3] Ramaswamy Chandramouli,et al. Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.
[4] Jianhua Che,et al. Study on the Security Models and Strategies of Cloud Computing , 2011 .
[5] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Neeraj Suri,et al. Security as a Service Using an SLA-Based Approach via SPECS , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[8] Mats Björkman,et al. Security and Trust Preserving VM Migrations in Public Clouds , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[9] G. Manoj Someswar,et al. Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .
[10] M V Patil,et al. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .
[11] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[12] Shin-Jer Yang,et al. Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[13] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems a Cloud Based Health Insurance Plan Recommendation System: a User Centered Approach , 2022 .
[14] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[15] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[16] R. D. Dhungana,et al. Identity management framework for cloud networking infrastructure , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).
[17] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[18] Alowolodu O.D,et al. Elliptic Curve Cryptography for Securing Cloud Computing Applications , 2013 .
[19] Sadie Creese,et al. Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[20] O S Ogundele,et al. Elliptic Curve Cryptography for Securing Cloud Computing Applications , 2013 .
[21] Rose F. Gamble,et al. SecAgreement: Advancing Security Risk Calculations in Cloud Services , 2012, 2012 IEEE Eighth World Congress on Services.
[22] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[23] S. Anandamurugan,et al. Research Issues in Enterprise Cloud Computing , 2015 .
[24] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[25] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[26] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[27] Yangchun Fu,et al. EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery , 2013, VEE '13.
[28] Rose F. Gamble,et al. Risk propagation of security SLAs in the cloud , 2012, 2012 IEEE Globecom Workshops.
[29] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[30] Siu-Ming Yiu,et al. SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.