Data Confidentiality using Fragmentation in Cloud Computing
暂无分享,去创建一个
Edgar R. Weippl | Shareeful Islam | Peter Kieseberg | Aleksandar Hudic | Sylvi Rennert | E. Weippl | Shareeful Islam | Aleksandar Hudic | Peter Kieseberg | Sylvi Rennert
[1] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[2] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[3] Peeyush Mathur,et al. Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[4] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[5] Huang Bin,et al. A novel metadata management scheme in Cloud Computing , 2010, 2010 2nd International Conference on Software Technology and Engineering.
[6] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[7] Richard W. Scamell,et al. Data Modeling and Database Design , 2007 .
[8] P. Venkat Rangan,et al. Efficient Storage Techniques for Digital Continuous Multimedia , 1993, IEEE Trans. Knowl. Data Eng..
[9] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[10] Roel Wieringa,et al. Risk-based Confidentiality Requirements Specification for Outsourced IT Systems , 2010, 2010 18th IEEE International Requirements Engineering Conference.
[11] Kevin Curran,et al. Security Issues in Cloud Computing , 2012 .
[12] Luis Rodero-Merino,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[13] Asadullah Shah,et al. Cloud Computing Adoption Model for Universities to Increase ICT Proficiency , 2014 .
[14] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[15] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[16] Brian Randell,et al. A note on storage fragmentation and program segmentation , 1969, CACM.
[17] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[18] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[19] Jan Jürjens,et al. A framework to support alignment of secure software engineering with legal regulations , 2011, Software & Systems Modeling.
[20] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[21] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[22] E. Weippl,et al. A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System , 2013 .
[23] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[24] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[25] Eugene Ciurana,et al. Google App Engine , 2009 .