Media Gateway: bringing privacy to private multimedia cloud connections
暂无分享,去创建一个
Andrés Marín López | Florina Almenárez | Daniel Díaz Sánchez | Patricia Arias Cabarcos | Rosa Sánchez-Guerrero
[1] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[2] Andrés Marín López,et al. Multi-device Single Sign-on for cloud service continuity , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).
[3] Klaus Wehrle,et al. Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.
[4] Jeffrey M. Voas,et al. Cloud Computing: New Wine or Just a New Bottle? , 2009, IT Professional.
[5] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[6] Yunhao Liu,et al. Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching , 2012, IEEE Transactions on Knowledge and Data Engineering.
[7] Spyros G. Denazis,et al. Introducing a cross federation identity solution for converged network environments , 2010, IPTComm.
[8] Russell Perry,et al. Content-Centered Collaboration Spaces in the Cloud , 2009, IEEE Internet Computing.
[9] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[10] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[11] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[12] Kyung Sup Kwak,et al. Preamble-based improved channel estimation for multiband UWB system in presence of interferences , 2013, Telecommun. Syst..
[13] Andrés Marín López,et al. A privacy aware media gateway for connecting private multimedia clouds to limited devices , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).
[14] Les Labuschagne,et al. Cognitive Approaches for Digital Forensic Readiness Planning , 2013, IFIP Int. Conf. Digital Forensics.
[15] Jim Gray,et al. Distributed Computing Economics , 2004, ACM Queue.
[16] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] Nicholas J Carson. Born Digital: Understanding the First Generation of Digital Natives, John Palfrey, Urs Gasser. Basic Books, New York (2008), 375 pp, $25.95 (hardcover) , 2010 .
[18] Bharat K. Bhargava,et al. An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[19] Thomas Magedanz,et al. Contextualized User-Centric Multimedia Delivery System for Next Generation Networks , 2011, Telecommun. Syst..
[20] Michael T. Goodrich,et al. Invertible bloom lookup tables , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.
[22] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[23] David K. Chiabi. European Telecommunications Standards Institute , 2015 .
[24] Benny Rochwerger,et al. A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[25] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[26] Karin K. Breitman,et al. When TV Dies, Will It Go to the Cloud? , 2010, Computer.
[27] Andrés Marín López,et al. Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.
[28] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[29] Mohammad Nauman,et al. Using trusted computing for privacy preserving keystroke-based authentication in smartphones , 2013, Telecommun. Syst..
[30] Hakan Erdogmus. A Process That Is Not , 2009, IEEE Software.
[31] Doug Johnson,et al. Computing in the Clouds. , 2010 .
[32] Thomas Coughlin,et al. Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).
[33] Hong Cheng,et al. Clustering Large Attributed Graphs: A Balance between Structural and Attribute Similarities , 2011, TKDD.
[34] Kai Rannenberg,et al. How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project , 2010, SEC.
[35] Hakan Erdogmus,et al. Cloud Computing: Does Nirvana Hide behind the Nebula? , 2009, IEEE Softw..
[36] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[37] Andrés Marín López,et al. Context awareness in network selection for dynamic environments , 2006, PWC.
[38] Galen C. Hunt. Proceedings of the 11th USENIX workshop on Hot topics in operating systems , 2007 .
[39] Eui-Nam Huh,et al. Towards the Development of Personal Cloud Computing for Mobile Thin-Clients , 2011, 2011 International Conference on Information Science and Applications.
[40] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[41] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[42] Daniel Díaz Sánchez,et al. Trust-aware federated IdM in consumer cloud computing , 2012, ICCE.
[43] Bu-Sung Lee,et al. Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[44] Douglas F. Parkhill,et al. The Challenge of the Computer Utility , 1966 .