Framework modeling for User privacy in cloud computing
暂无分享,去创建一个
[1] Laurence T. Yang,et al. PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing , 2017, IEEE Transactions on Big Data.
[2] Marin Litoiu,et al. Partitioning applications for hybrid and federated clouds , 2012, CASCON.
[3] Neepa K. Shah. Big data and cloud computing: Pitfalls and advantages in data management , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[4] Narasimham Challa,et al. Advanced Persistent Threat defense system using self-destructive mechanism for Cloud Security , 2016, 2016 IEEE International Conference on Engineering and Technology (ICETECH).
[5] Yan Yu,et al. Resource-centric Dynamic Access Control in Cloud , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[6] Amit Kumar Das,et al. Q-MAC: QoS and mobility aware optimal resource allocation for dynamic application offloading in mobile cloud computing , 2017, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE).
[7] James R. Larus. The cloud will change everything , 2011, ASPLOS XVI.
[8] L. Stein,et al. OWL Web Ontology Language - Reference , 2004 .
[9] Athanasios V. Vasilakos,et al. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..
[10] Deborah L. McGuinness,et al. OWL Web ontology language overview , 2004 .
[11] Frank van Harmelen,et al. Web Ontology Language: OWL , 2004, Handbook on Ontologies.
[12] Edgar R. Weippl,et al. Network-Based Secret Communication in Clouds: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[13] Wang Shoukun,et al. Attribute-Based Solution with Time Restriction Delegate for Flexible and Scalable Access Control in Cloud Storage , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).
[14] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[15] Rupak Majumdar,et al. MrCrypt: static analysis for secure cloud computations , 2013, OOPSLA.
[16] Seema Verma,et al. A comprehensive evaluation of cryptographic algorithms in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[17] Rashid Sheikh,et al. Implementation of secure authentication scheme and access control in cloud computing , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[18] Abhaykumar Kumbhar,et al. A Survey on Legacy and Emerging Technologies for Public Safety Communications , 2015, IEEE Communications Surveys & Tutorials.
[19] Nikolai Tillmann,et al. User-aware privacy control via extended static-information-flow analysis , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[20] Wang Liangmin,et al. Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud , 2016 .
[21] Mauro Conti,et al. Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[22] S. Radhikadevi,et al. Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption , 2016, 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).
[23] A. Lebbat,et al. A formal specification approach of Privacy-aware Attribute Based Access Control (Pa-ABAC) model for cloud computing , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).
[24] Dong Hoon Lee,et al. A study on static analysis model of mobile application for privacy protection , 2012, CSA 2012.
[25] Meryeme Alouane,et al. Security, privacy and trust in cloud computing: A comparative study , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[26] Xiaoyan Sun,et al. DAC-Mobi: Data-Assisted Communications of Mobile Images with Cloud Computing Support , 2016, IEEE Transactions on Multimedia.