Cloud security and privacy model for providing secure cloud services
暂无分享,去创建一个
Abdellah Ezzati | Cina Motamed | Abderrahim Beni-Hssane | Khalid El Makkaoui | C. Motamed | Abdellah Ezzati | Khalid El Makkaoui | A. Beni-Hssane
[1] Shai Halevi,et al. Homomorphic Encryption , 2017, Tutorials on the Foundations of Cryptography.
[2] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[3] Dimitris Gritzalis,et al. The Insider Threat in Cloud Computing , 2011, CRITIS.
[4] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[5] RajaniKanth Aluvalu,et al. A Survey on Access Control Models in Cloud Computing , 2015 .
[6] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[7] Gabriela Moise,et al. A New Approach of the Cryptographic Attacks , 2011, DICTAP.
[8] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[9] Dooho Choi,et al. Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis , 2015 .
[10] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..