A privacy breach preventing and mitigation methodology for cloud service data storage
暂无分享,去创建一个
[1] P. Dhavachelvan,et al. Web Service Suitability Assessment for Cloud Computing , 2011 .
[2] Ramachandran Baskaran,et al. A Privacy Preserving Representation for Web Service Communicators' in the Cloud , 2013, QSHINE.
[3] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[4] P. Dhavachelvan,et al. HPPC-Hierarchical Petri-Net based Privacy nominal model approach for Cloud , 2012, 2012 Annual IEEE India Conference (INDICON).
[5] Jinjun Chen,et al. A historical probability based noise generation strategy for privacy protection in cloud computing , 2012, J. Comput. Syst. Sci..
[6] Ramachandran Baskaran,et al. QoS enhancements for global replication management in peer to peer networks , 2012, Future Gener. Comput. Syst..
[7] P. Dhavachelvan,et al. Complexity measures for software systems : towards multi-agent based software testing , 2005, Proceedings of 2005 International Conference on Intelligent Sensing and Information Processing, 2005..
[8] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[9] G. V. Uma,et al. A new approach in development of distributed framework for automated software testing using agents , 2006, Knowl. Based Syst..
[10] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[11] G. V. Uma,et al. Reliability Enhancement in Software Testing - An Agent-Based Approach for Complex Systems , 2004, CIT.
[12] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[13] Yan Zhao,et al. Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.
[14] Dhavachelvan Ponnurangam,et al. A survey of keyword spotting techniques for printed document images , 2010, Artificial Intelligence Review.
[15] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[16] S. K. V. Jayakumar,et al. Dwse-simulator for distributed web service environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[17] P. Victer Paul,et al. Improving Efficiency of Peer Network Applications by Formulating Distributed Spanning Tree , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.
[18] M. Shanmugam,et al. SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues , 2012, ACITY.
[19] Jie Wu,et al. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.
[20] Jinjun Chen,et al. An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing , 2012, ICSOC.
[21] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[22] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[23] P. Dhavachelvan,et al. An agent-based personalized E-learning environment: Effort prediction perspective , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.
[24] C. Chellappan,et al. Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.
[25] Ramachandran Baskaran,et al. An application perspective evaluation of multi-agent system in versatile environments , 2011, Expert Syst. Appl..
[26] T. Vengattaraman,et al. MSRCC - Mitigation of Security Risks in Cloud Computing , 2012, ACITY.
[27] M. S. Saleem Basha,et al. Web Service Based Secure E-Learning Management System- EWeMS , 2010, J. Convergence Inf. Technol..
[28] David W. Chadwick,et al. A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..