Third Party Auditing for Service Assurance in Cloud Computing
暂无分享,去创建一个
[1] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[2] Robert H. Deng,et al. Authenticating Query Results in Data Publishing , 2005, ICICS.
[3] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[4] R. Myerson,et al. Regulating a Monopolist with Unknown Costs , 1982 .
[5] R. Subramanian,et al. Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[6] Shucheng Yu,et al. Flexible and publicly verifiable aggregation query for outsourced databases in cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[7] Xinbing Wang,et al. Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach , 2011, IEEE Journal on Selected Areas in Communications.
[8] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[9] Zheng Yan,et al. Context-Aware Verifiable Cloud Computing , 2017, IEEE Access.
[10] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[11] Ki-Woong Park,et al. THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[12] Jacques Lawarree,et al. Collusion in Hierarchical Agency , 2013 .
[13] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[14] T. Mulgan. The Contract Theory , 2006 .
[15] G. Bower. Mood and memory. , 1981, The American psychologist.
[16] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[17] Ahmad-Reza Sadeghi,et al. Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.
[18] David P. Baron,et al. Regulation, Asymmetric Information, and Auditing , 1984 .
[19] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[20] Ilsun You,et al. Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.