Policing as a Service in the Cloud
暂无分享,去创建一个
[1] Paula T. Kaufman,et al. The USA PATRIOT Act. , 2002 .
[2] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[3] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[4] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[5] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[6] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[7] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[8] D Jayalatchumy,et al. Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.
[9] Vikas Ranganathan,et al. Privacy Issues with Cloud Applications , 2010 .
[10] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[11] Dan Feng,et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[12] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[13] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[14] Andrew Charlesworth,et al. A Privacy Impact Assessment Tool for Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[15] Igor Nai Fovino-Head. Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing , 2011 .
[16] Miguel Correia,et al. The Final Frontier: Confidentiality and Privacy in the Cloud , 2011, Computer.
[17] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[18] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[19] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[20] Nahid Shahmehri,et al. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[21] Tim Storer,et al. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.
[22] Shahrzad Zargari,et al. Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.
[23] Mohamed Hamdi. Security of cloud computing, storage, and networking , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[24] N. van Eijk,et al. Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act , 2012 .
[25] Peng Zhang,et al. Public Data Integrity Verification for Secure Cloud Storage , 2013, J. Networks.
[26] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[27] P. Parthasarathi,et al. Enhanced audit services for the correctness of outsourced data in cloud storage , 2013 .
[28] P. N. B. S. Srinivas,et al. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens , 2013 .
[29] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[30] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[31] James M Lutz,et al. USA Patriot Act , 2014 .