Efficient Healthcare Integrity Assurance in the Cloud with Incremental Cryptography and Trusted Computing
暂无分享,去创建一个
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Vasilios Katos,et al. Data Recovery Strategies for Cloud Environments , 2013 .
[3] Brian Berger,et al. Trusted computing group history , 2005, Inf. Secur. Tech. Rep..
[4] Milos Ivanovic,et al. Dot Net Platform for Distributed Evolutionary Algorithms with Application in Hydroinformatics , 2014 .
[5] Nihal Alam,et al. Cloud Computing and Its Application to Information Centre , 2014 .
[6] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[7] Ganesh Chandra Deka,et al. Handbook of Research on Cloud Infrastructures for Big Data Analytics , 2014 .
[8] Anastasia N. Kastania,et al. Cloud Computing Applications for Quality Health Care Delivery , 2014 .
[9] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[10] Niraj K. Jha,et al. Secure Virtual Machine Execution under an Untrusted Management OS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[11] G. Annas. HIPAA regulations - a new era of medical-record privacy? , 2003, The New England journal of medicine.
[12] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[13] Kun Yang,et al. Addressing Device-Based Adaptation of Services: A Model Driven Web Service Oriented Development Approach , 2013 .
[14] Božidar Radenković,et al. From Mainframe to Cloud , 2014 .
[15] George Mastorakis. Resource Management of Mobile Cloud Computing Networks and Environments , 2015 .
[16] Dean Gonsowski. Compliance in the Cloud and the Implications on Electronic Discovery , 2015 .
[17] Miloš Milutinović,et al. Ontology-Based Multimodal Language Learning , 2014 .
[18] Bennet S. Yee,et al. Dyad : a system for using physically secure coprocessors , 1991 .
[19] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[20] Marijana Despotović-Zrakić,et al. Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education , 2014 .
[21] Daphne Lopez,et al. Middleware for Preserving Privacy in Big Data , 2014 .
[22] Vahé A. Kazandjian. Not Just Meaningful Data but Coordinated Data!: Can Cloud Computing Promote Down-to-Earth E-Valuation of Disease and Healthcare? , 2015 .
[23] Binod Gurung,et al. Integration of Cloud Technologies in Digitally Networked Classrooms and Learning Communities , 2016 .
[24] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[25] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[26] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[27] Angelos K. Marnerides. Anomaly Detection in Cloud Environments , 2015 .