Quad-Sec: Preserving Privacy of Data in Cloud
暂无分享,去创建一个
[1] Muthucumaru Maheswaran,et al. Privacy and Security Requirements of Data Intensive Computing in Clouds , 2011 .
[2] Muthucumaru Maheswaran,et al. Privacy aware image template matching in clouds using ambient data , 2013, The Journal of Supercomputing.
[3] Srinath T. V. Setty,et al. Depot: Cloud Storage with Minimal Trust , 2010, TOCS.
[4] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[5] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[6] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[7] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[8] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[9] Divyakant Agrawal,et al. Big data and cloud computing: current state and future opportunities , 2011, EDBT/ICDT '11.
[10] Christian Cachin,et al. Don't trust the cloud, verify: integrity and consistency for cloud object stores , 2015, SYSTOR.
[11] Cong Wang,et al. Enabling Privacy-Preserving Image-Centric Social Discovery , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[12] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[13] Laurent Amsaleg,et al. A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval , 2015, IEEE Transactions on Information Forensics and Security.
[14] C. Arun,et al. Survey on interoperability, security, trust, privacy standardization of cloud computing , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[15] Idit Keidar,et al. Venus: verification for untrusted cloud storage , 2010, CCSW '10.
[16] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[19] Nazrul Islam,et al. Multimedia content security with random key generation approach in cloud computing , 2017, 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR).
[20] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[21] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[22] João Leitão,et al. Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).