Controlling data in the cloud: outsourcing computation without outsourcing control
暂无分享,去创建一个
Markus Jakobsson | Elaine Shi | Jessica Staddon | Philippe Golle | Richard Chow | Ryusuke Masuoka | Jesus Molina | E. Shi | M. Jakobsson | P. Golle | Jessica Staddon | J. Molina | R. Masuoka | Richard Chow | J. Staddon
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[5] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[6] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[7] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[8] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[9] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[10] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] G. Sahoo,et al. A Secure Cloud Computing , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.