Preventing Information Leakage from Indexing in the Cloud
暂无分享,去创建一个
[1] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[2] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[3] Michael Huth,et al. A simple and expressive semantic framework for policy composition in access control , 2007, FMSE '07.
[4] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[5] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[6] Qiang Tang,et al. On Using Encryption Techniques to Enhance Sticky Policies Enforcement , 2008 .
[7] Paul T. Jaeger,et al. Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .
[8] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[9] Alexander Lazovik,et al. IEEE International Conference on Cloud Computing , 2010 .
[10] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[11] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[12] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[13] Jaideep Vaidya,et al. Privacy-preserving indexing of documents on the network , 2003, The VLDB Journal.
[14] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[15] Fernando Pérez-González,et al. Watermarking Security: A Survey , 2006, Trans. Data Hiding Multim. Secur..
[16] Henrich Christopher Pöhls,et al. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data , 2008, ICICS.
[17] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[18] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[19] Michael Waidner,et al. Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data , 2007, Privacy Enhancing Technologies.
[20] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[21] Siani Pearson,et al. Towards Accountable Management of Privacy and Identity Information , 2003, ESORICS.
[22] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[23] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[24] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[25] Sheng Zhong,et al. Towards Privacy-Preserving Model Selection , 2007, PinKDD.
[26] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.