BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
暂无分享,去创建一个
[1] M. Anand,et al. Cloud Monitor: Monitoring Applications in Cloud , 2012, 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[2] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Erwin Laure,et al. Advanced Cloud Privacy Threat Modeling , 2016, ArXiv.
[4] Christoph Fiehe,et al. Scalable Monitoring System for Clouds , 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing.
[5] Anderson Santana de Oliveira,et al. Platform-level Support for Authorization in Cloud Services with OAuth 2 , 2014, 2014 IEEE International Conference on Cloud Engineering.
[6] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[7] Martin Gilje Jaatun,et al. Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[8] Vijay Varadharajan,et al. Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[9] Emiliano De Cristofaro,et al. The Chills and Thrills of Whole Genome Sequencing , 2013, Computer.
[10] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[11] Erik Elmroth,et al. A Synchronization Mechanism for Cloud Accounting Systems , 2014, 2014 International Conference on Cloud and Autonomic Computing.
[12] Ricardo Azevedo,et al. E-Id Authentication and Uniform Access to Cloud Storage Service Providers , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[13] Ralph Deters,et al. SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud , 2013, 2013 IEEE Ninth World Congress on Services.
[14] Johnny Wong,et al. Proliferating Cloud Density through Big Data Ecosystem, Novel XCLOUDX Classification and Emergence of as-a-Service Era , 2016 .
[15] Hassan Takabi,et al. Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment , 2012, 2012 45th Hawaii International Conference on System Sciences.
[16] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[17] Gabriel Antoniu,et al. Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[18] Ahmad-Reza Sadeghi,et al. Swap and Play: Live Updating Hypervisors and Its Application to Xen , 2014, CCSW.
[19] Jennifer Harris,et al. Genomic cloud computing: legal and ethical points to consider , 2014, European Journal of Human Genetics.
[20] Sateesh K. Peddoju,et al. Classification and comparison of NoSQL big data models , 2015, Int. J. Big Data Intell..
[21] Matthew Portnoy,et al. Virtualization Essentials , 2012 .
[22] Erwin Laure,et al. ScaBIA: Scalable Brain Image Analysis in the Cloud , 2013, CLOSER.
[23] Dharmesh Kakadia,et al. Virtualization vs Containerization to Support PaaS , 2014, 2014 IEEE International Conference on Cloud Engineering.
[24] Rohitash Kumar Banyal,et al. Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.
[25] Jim Dowling,et al. A security framework for population-scale genomics analysis , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).
[26] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[27] Erwin Laure,et al. Privacy-Preservation for Publishing Sample Availability Data with Personal Identifiers , 2015 .
[28] Mats Näslund,et al. A Framework for Authentication and Authorization Credentials in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[29] Srikanta Patnaik,et al. Leading NoSQL models for handling Big Data: a brief review , 2016, Int. J. Bus. Inf. Syst..
[30] Murat Kantarcioglu,et al. Policy Enforcement Framework for Cloud Data Management , 2012, IEEE Data Eng. Bull..
[31] Sophie Stalla-Bourdillon. Liability Exemptions Wanted! Internet Intermediaries’ Liability under UK Law , 2012 .
[32] Qi Li,et al. Multi-tenancy authorization models for collaborative cloud services , 2013, CTS.
[33] Tobias Pulls,et al. How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? , 2013, Privacy and Identity Management.
[34] Gabi Dreo Rodosek,et al. ICEMAN: An architecture for secure federated inter-cloud identity management , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[35] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[36] Guang Gong,et al. Fuzzy Authorization for Cloud Storage , 2014, IEEE Transactions on Cloud Computing.
[37] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[38] Yong Wang,et al. Hypervisor-based cloud intrusion detection system , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[39] Elisa Bertino,et al. Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.
[40] Joni da Silva Fraga,et al. Integral Federated Identity Management for Cloud Computing , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[41] Ruby B. Lee,et al. Characterizing hypervisor vulnerabilities in cloud computing servers , 2013, Cloud Computing '13.
[42] Carlos Becker Westphall,et al. Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth , 2012, ICON 2012.
[43] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .
[44] Adam Molyneaux,et al. Privacy-Preserving Processing of Raw Genomic Data , 2013, DPM/SETOP.
[45] Hyunwoo Kim,et al. X.509 Authentication and Authorization in Fermi Cloud , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.
[46] Mark I. McCarthy,et al. SAIL—a software system for sample and phenotype availability across biobanks and cohorts , 2010, Bioinform..
[47] Howard Gobioff,et al. The Google file system , 2003, SOSP '03.
[48] Yin Chen,et al. The user support programme and the training infrastructure of the EGI Federated Cloud , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).
[49] Ian Goldberg,et al. Outsourced private information retrieval , 2013, WPES.
[50] Sugam Sharma,et al. Evolution of as-a-Service Era in Cloud , 2015, ArXiv.
[51] Peng Ning,et al. Enhancing security of Hadoop in a public cloud , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).