Regional Clouds: Technical Considerations
暂无分享,去创建一个
Jon Crowcroft | Jean Bacon | Anil Madhavapeddy | Thomas Pasquier | Jatinder Singh | W. Kuan Hon | Christopher Millard | J. Crowcroft | J. Bacon | Jatinder Singh | C. Millard | Thomas Pasquier | W. Hon | Anil Madhavapeddy
[1] David M. Eyers,et al. FlowK: Information Flow Control for the Cloud , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[2] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[3] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[4] Jon Crowcroft,et al. Unikernels: library operating systems for the cloud , 2013, ASPLOS '13.
[5] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[6] Jon Crowcroft,et al. Turning Down the LAMP: Software Specialisation for the Cloud , 2010, HotCloud.
[7] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[8] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[9] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[10] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.