AN EFFICIENT MODEL FOR PROVIDING SECURITY IN CLOUD COMPUTING ENVIRONMENT
暂无分享,去创建一个
Vikas Kumar | ey | P Sweta
[1] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[2] A. Richard Newton,et al. An estimation technique to guide low power resynthesis algorithms , 1995, ISLPED '95.
[3] Hui Wang,et al. Multi-Tiered On-Demand Resource Scheduling for VM-Based Data Center , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Rodrigo Fernandes de Mello,et al. A novel approach for distributed application scheduling based on prediction of communication events , 2010, Future Gener. Comput. Syst..
[6] D. Ramesh,et al. An Analysis on Energy Efficient System Design in Grid Computing , 2012 .
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[8] Energy Consumption Estimates of Information and Communication Technology : synthesis and analysis , 2009 .
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] E. N. Elnozahy,et al. Energy-Efficient Server Clusters , 2002, PACS.
[11] Feng Zhao,et al. Energy aware consolidation for cloud computing , 2008, CLUSTER 2008.
[12] Reihaneh Safavi-Naini,et al. Attribute-Based Encryption with Key Cloning Protection , 2008, IACR Cryptol. ePrint Arch..
[13] Xiaofeng Wang,et al. Foundations and Technological Landscape of Cloud Computing , 2013 .
[14] Jordi Torres,et al. Towards energy-aware scheduling in data centers using machine learning , 2010, e-Energy.
[15] Feng Zhao,et al. Fine-grained energy profiling for power-aware application design , 2008, PERV.
[16] Enrique V. Carrera,et al. Load balancing and unbalancing for power and performance in cluster-based systems , 2001 .
[17] Tajana Simunic,et al. vGreen: a system for energy efficient computing in virtualized environments , 2009, ISLPED.
[18] Luiz André Barroso,et al. The Case for Energy-Proportional Computing , 2007, Computer.
[19] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[20] Karsten Schwan,et al. VirtualPower: coordinated power management in virtualized enterprise systems , 2007, SOSP.
[21] Helen J. Wang,et al. SecondNet: a data center network virtualization architecture with bandwidth guarantees , 2010, CoNEXT.
[22] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[23] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[25] Cong Wang,et al. Enhancing Attribute-Based Encryption with Attribute Hierarchy , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[26] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.