Cloud Computing Privacy Issues and User-Centric Solution
暂无分享,去创建一个
[1] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[2] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[3] Daniele Sgandurra,et al. Cloud security is not (just) virtualization security: a short paper , 2009, CCSW '09.
[4] Siani Pearson,et al. A client-based privacy manager for cloud computing , 2009, COMSWARE '09.
[5] Daniele Sgandurra,et al. Cloud Security Is Not (Just) Virtualization Security , 2009 .
[6] Hiroyuki Sato,et al. A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[7] Dawn Song,et al. Proceedings of the 2009 ACM workshop on Cloud computing security , 2009, CloudCom 2009.
[8] Willem-Jan van den Heuvel,et al. Best practices in cloud computing: designing for the cloud , 2009, OOPSLA Companion.
[9] Margo I. Seltzer,et al. Provenance: a future history , 2009, OOPSLA Companion.
[10] Ashutosh Saxena,et al. A cryptography based privacy preserving solution to mine cloud data , 2010, Bangalore Compute Conf..
[11] Dan Lin,et al. Data protection models for service provisioning in the cloud , 2010, SACMAT '10.
[12] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[13] Sascha Ossowski,et al. Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010 , 2010, SAC.
[14] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[15] Xuezeng Pan,et al. Use trust management module to achieve effective security mechanisms in cloud environment , 2010, 2010 International Conference on Electronics and Information Engineering.
[16] Shouhuai Xu,et al. Proceedings of the 3rd ACM workshop on Scalable trusted computing , 2008, CCS 2008.
[17] Jan Bosch,et al. Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE , 2009, COMSWARE 2009.
[18] Ting Yu,et al. Towards secure dataflow processing in open distributed systems , 2009, STC '09.
[19] Zhang Yang,et al. Security Scheme for Sensitive Data in Management-Type SaaS , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.
[20] Roberto Di Pietro,et al. Transparent security for cloud , 2010, SAC '10.
[21] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[22] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[23] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.