A Novel Integrated Attestation Graph Analysis Scheme for Enhancing Result Quality and Higher Attacker Pinpointing Accuracy
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services , 2009, ISC.
[2] Vincent Roca,et al. Managing and securing Web services with VPNs , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[3] Jennifer Widom,et al. STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..
[4] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[5] Michel Savoie,et al. Service-Oriented Virtual Private Networks for Grid Applications , 2007, IEEE International Conference on Web Services (ICWS 2007).
[6] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[7] Philip S. Yu,et al. SPADE: the system s declarative stream processing engine , 2008, SIGMOD Conference.
[8] Gustavo Alonso,et al. Web Services: Concepts, Architectures and Applications , 2009 .
[9] Barbara Carminati,et al. Towards standardized Web services privacy technologies , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[10] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.
[11] I. V. Ramakrishnan,et al. A Framework for Building Privacy-Conscious Composite Web Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).