暂无分享,去创建一个
Sugata Sanyal | Rajdeep Borgohain | Rohit Bhadauria | Abirlal Biswas | S. Sanyal | R. Borgohain | Abirlal Biswas | Rohit Bhadauria
[1] G. Mathew. Elements of application security in the cloud computing environment , 2012, 2012 IEEE Conference on Open Systems.
[2] Vijay K. Naik,et al. Network-Level Access Control Management for the Cloud , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).
[3] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[4] Liang Xue,et al. Business Process Centric Platform-as-a-Service Model and Technologies for Cloud Enabled Industry Solutions , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[5] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[6] Wei Sun,et al. Design Aspects of Software as a Service to Enable E-Business through Cloud Platform , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[7] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[8] Anoop Gupta,et al. Designing and deploying an information awareness interface , 2002, CSCW '02.
[9] Dana Petcu,et al. Towards a Cross Platform Cloud API - Components for Cloud Federation , 2011, CLOSER.
[10] Sugata Sanyal,et al. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.
[11] Tao Chen,et al. A System for Parallel Data Mining Service on Cloud , 2012, 2012 Second International Conference on Cloud and Green Computing.
[12] Udo Bub,et al. Platform-as-a-Service for business customers , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.
[13] Wei-bang Chen,et al. A Data Mining Method to Extract and Rank Papers Describing Coexpression Predicates Semantically , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[14] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[15] Maneesha Sharma,et al. Cloud Computing: Different Approach & Security Challenge , 2012 .
[16] Kishor S. Trivedi,et al. Quantifying Resiliency of IaaS Cloud , 2010, SRDS.
[17] Sugata Sanyal,et al. A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks , 2010, ArXiv.
[18] Sugata Sanyal,et al. SCIDS: A Soft Computing Intrusion Detection System , 2004, IWDC.
[19] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[20] Dharma P. Agrawal,et al. Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[21] Inderveer Chana,et al. Advance Billing and Metering Architecture for Infrastructure as a Service , 2013, CloudCom 2013.
[22] Wei-Tek Tsai,et al. SaaS performance and scalability evaluation in clouds , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).
[23] Robert Vrbić. Data Mining and Cloud Computing , 2012 .
[24] Costas Lambrinoudakis,et al. Cryptography Goes to the Cloud , 2011, STA Workshops.
[25] Luis M. Vaquero. EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course , 2011, IEEE Transactions on Education.
[26] Sugata Sanyal,et al. RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks , 2013, ArXiv.
[27] G. Geetha Kumari,et al. API access control in cloud using the Role Based Access Control Model , 2010, Trendz in Information Sciences & Computing(TISC2010).
[28] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[29] Sugata Sanyal,et al. CompChall: addressing password guessing attacks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[30] Sugata Sanyal,et al. The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[31] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[32] Feng Liu,et al. SaaS Integration for Software Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[33] Sugata Sanyal,et al. A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security , 2011, ArXiv.
[34] Fen Zhou,et al. The Application of SaaS-Based Cloud Computing in the University Research and Teaching Platform , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[35] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.