Data Storage Security Model for Cloud Computing
暂无分享,去创建一个
Dhiren Patel | Bhavesh Borisaniya | Avi Patel | Hiren Patel | D. Patel | Bhavesh Borisaniya | H. Patel | Avi Patel
[1] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[2] C Praveen Ram,et al. Security as a Service (SasS): Securing user data by coprocessor and distributing the data , 2010, Trendz in Information Sciences & Computing(TISC2010).
[3] Muttukrishnan Rajarajan,et al. Secure data access in cloud computing , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.
[4] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[5] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[6] Cong Wang,et al. Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2009, IACR Cryptol. ePrint Arch..
[7] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[8] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[9] Alasdair McAndrew. Data Encryption Standard (DES) for Sage , 2009 .
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Geng Yang,et al. Secure Document Service for Cloud Computing , 2009, CloudCom.
[12] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Ge Cheng,et al. Sealed storage for trusted cloud computing , 2010, 2010 International Conference On Computer Design and Applications.
[15] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[16] Qiaoyan Wen,et al. A View about Cloud Data Security from Data Life Cycle , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[17] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[18] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[19] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[20] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[22] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[23] M.R. Tribhuwan,et al. Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[26] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[27] Yau-Hwang Kuo,et al. An effective privacy protection scheme for cloud computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[28] Jerome H. Saltzer,et al. Section E.2.1 Kerberos Authentication and Authorization System , 1988 .
[29] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.