Comparative Study and Improved Security Threats in Cloud Computing
暂无分享,去创建一个
[1] Francesco Pagano,et al. Using in-memory encrypted databases on the cloud , 2011, 2011 1st International Workshop on Securing Services on the Cloud (IWSSC).
[2] Ashutosh Saxena,et al. Data integrity proofs in cloud storage , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[3] A. Kakoli rao. Centralized Database Security in Cloud , 2012 .
[4] C Praveen Ram,et al. Security as a Service (SasS): Securing user data by coprocessor and distributing the data , 2010, Trendz in Information Sciences & Computing(TISC2010).
[5] Michel Riveill,et al. Cloud computing, security and data concealment , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[6] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[7] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[8] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .