Cloud Computing Security--Trends and Research Directions
暂无分享,去创建一个
Shubhashis Sengupta | Vibhu Saujanya Sharma | Vikrant S. Kaulgud | Shubhashis Sengupta | V. Sharma | Vikrant S. Kaulgud
[1] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[2] Nils Gruschka,et al. A survey of attacks on web services , 2009, Computer Science - Research and Development.
[3] Sheng Zhong,et al. Privacy-enhancing k-anonymization of customer data , 2005, PODS.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[6] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[7] Grzegorz Czajkowski,et al. Application isolation in the Java Virtual Machine , 2000, OOPSLA '00.
[8] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[9] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[10] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[11] Ed Skoudis,et al. Hiding Virtualization from Attackers and Malware , 2007, IEEE Security & Privacy.
[12] Margo I. Seltzer,et al. Provenance for the Cloud , 2010, FAST.
[13] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[14] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.