Design and auditing of Cloud computing security
暂无分享,去创建一个
M. Roberts Masillamani | Bhagyaraj Gowrigolla | Sathyalakshmi Sivaji | M. Masillamani | Bhagyaraj Gowrigolla | Sathyalakshmi Sivaji
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[3] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[4] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[5] Michael A. Caloyannides. Privacy vs. Information Technology , 2003, IEEE Secur. Priv..
[6] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[7] Roberto J. Bayardo,et al. Technological Solutions for Protecting Privacy , 2003, Computer.
[8] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[9] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[10] Frederik Armknecht,et al. Cross-layer Privacy Enhancement and Non-repudiation in Vehicular Communication , 2011 .