TrustCloud: A Framework for Accountability and Trust in Cloud Computing
暂无分享,去创建一个
Bu-Sung Lee | Siani Pearson | Miranda Mowbray | Qianhui Althea Liang | Markus Kirchberg | Ryan K. L. Ko | Peter Jagadpramana | M. Kirchberg | Bu-Sung Lee | Siani Pearson | M. Mowbray | R. Ko | Q. Liang | Peter Jagadpramana
[1] G. J. Proudler. Concepts of trusted computing , 2005 .
[2] Alan Calder,et al. IT Governanace: A Manager's Guide to Data Security and ISO27001/ISO 27002 , 2008 .
[3] Alan Calder,et al. Information Security Based on ISO 27001/ISO 17799: A Management Guide , 2006 .
[4] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[5] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[6] Mendel Rosenblum,et al. The design and implementation of a log-structured file system , 1991, SOSP '91.
[7] Alan Calder,et al. Implementing Information Security Based on ISO 27001 and ISO 17799: A Management Guide , 2006 .
[8] Rick Elam,et al. Continuous Auditing: Building Automated Auditing Capability , 2002 .
[9] Thomas Erl,et al. Service-Oriented Architecture: Concepts, Technology, and Design , 2005 .
[10] Henry Li. Introducing Windows Azure , 2009 .
[11] Val Tannen,et al. Provenance semirings , 2007, PODS.
[12] Olaf Hartig. Provenance Information in the Web of Data , 2009, LDOW.
[13] Harry Halpin,et al. Provenance: The Missing Component of the Semantic Web , 2009, SPOT@ESWC.
[14] William Yurcik,et al. Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[15] Andreas Haeberlen,et al. Accountable Virtual Machines , 2010, OSDI.
[16] Wang Chiew Tan. Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..
[17] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[18] William Yurcik,et al. Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows , 2004 .
[19] Eng Wah Lee,et al. Business process management (BPM) standards: a survey , 2009, Bus. Process. Manag. J..
[20] RosenblumMendel,et al. The design and implementation of a log-structured file system , 1991 .
[21] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[22] Stephen E. Hansen,et al. Automated System Monitoring and Notification with Swatch , 1993, LISA.
[23] Margo I. Seltzer,et al. Provenance as first class cloud data , 2010, OPSR.
[24] Xiaozhou Li,et al. Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.
[25] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[26] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[27] Margo I. Seltzer,et al. Provenance for the Cloud , 2010, FAST.
[28] A. Meyer. The Health Insurance Portability and Accountability Act. , 1997, Tennessee medicine : journal of the Tennessee Medical Association.
[29] Peng Ning,et al. Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.
[30] Simson L. Garfinkel,et al. An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .
[31] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[32] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[33] John Zic,et al. Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.
[34] Andreas Haeberlen,et al. A case for the accountable cloud , 2010, OPSR.
[35] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[36] Mladen A. Vouk,et al. Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.
[37] Peng Ning,et al. Always up-to-date: scalable offline patching of VM images in a compute cloud , 2010, ACSAC '10.
[38] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[39] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[40] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[41] John Zic,et al. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL , 2010, 2010 6th World Congress on Services.
[42] Merriam-Webster,et al. The Merriam Webster Dictionary , 1983 .
[43] Lynda L. McGhie,et al. THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .
[44] Siani Pearson,et al. Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.
[45] Bu-Sung Lee,et al. Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.