Trust and privacy concern in the Cloud

[1]  Yoichi Muraoka,et al.  HPC Benchmarks on Amazon EC2 , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[2]  Dan Lin,et al.  Preventing Information Leakage from Indexing in the Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[3]  Victor I. Chang,et al.  A Review of Cloud Business Models and Sustainability , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[4]  Feng Wang,et al.  Application of Cloud Computing in the Network Learning Environment , 2010, 2010 International Symposium on Computational Intelligence and Design.

[5]  T. S. Raghu,et al.  The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.

[6]  Feiyi Wang,et al.  Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[7]  Jinzhu Kong A Practical Approach to Improve the Data Privacy of Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[8]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[9]  Gurpreet Dhillon,et al.  Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..

[10]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.