Cloudopsy: An Autopsy of Data Flows in the Cloud
暂无分享,去创建一个
Angelos D. Keromytis | Michalis Polychronakis | Georgios Portokalidis | Vasileios P. Kemerlis | Vasilis Pappas | Angeliki Zavou
[1] Angelos D. Keromytis,et al. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data , 2012 .
[2] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[3] Véronique Cortier,et al. Measuring vote privacy, revisited , 2012, CCS.
[4] Hal Berghel. Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians , 2012, Computer.
[5] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[6] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] David Molnar,et al. Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud , 2010, WEIS.
[8] Steven J. M. Jones,et al. Circos: an information aesthetic for comparative genomics. , 2009, Genome research.
[9] Ruby B. Lee,et al. A software-hardware architecture for self-protecting data , 2012, CCS.
[10] Benny Rochwerger,et al. A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[11] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[12] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[13] Hal Berghel. Identity Theft and Financial Fraud: Some Strangeness in the Proportions , 2012, Computer.