An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems
暂无分享,去创建一个
[1] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[2] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[3] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[4] Flora Amato,et al. Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services , 2017, Future Gener. Comput. Syst..
[5] Luigi Coppolino,et al. Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Srdjan Capkun,et al. An architecture for concurrent execution of secure environments in clouds , 2013, CCSW.
[8] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[9] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[10] Luigi Coppolino,et al. Cloudifying Critical Applications: A Use Case from the Power Grid Domain , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).
[11] Abir Awad. Abir Awad , 2022 .
[12] Rüdiger Kapitza,et al. Secure Cloud Micro Services Using Intel SGX , 2017, DAIS.
[13] Gianfranco Cerullo,et al. A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network , 2016, SoMeT.
[14] Johannes Götzfried,et al. Hardware-Based Trusted Computing Architectures for Isolation and Attestation , 2018, IEEE Transactions on Computers.
[15] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[16] Anjan Bose,et al. GridCloud: Infrastructure for Cloud-Based Wide Area Monitoring of Bulk Electric Power Grids , 2019, IEEE Transactions on Smart Grid.
[17] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[18] Flora Amato,et al. A model driven approach to data privacy verification in E-Health systems , 2015, Trans. Data Priv..