注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Addressing the Data Location Assurance Problem of Cloud Storage Environments
作者: Ali Noman
DOI:
10.20381/RUOR-21644
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
1
uottawa.ca
本地加速
sci-hub.st
HTML
下载加速
参考文章
(48)
1.
Yashar Ganjali, David Lie, Phillipa Gill, Bernard Wong,
Dude, where’s that IP?: circumventing measurement-based IP geolocation
usenix security symposium.
pp. 16- 16 ,(2010)
2.
Ali Noman, Carlisle Adams,
Providing a data location assurance service for cloud storage environments
Journal of Multimedia.
,vol. 8, pp. 265- 286 ,(2012)
3.
Christoph Krauß, Volker Fusenig,
Using Trusted Platform Modules for Location Assurance in Cloud Networking
Network and System Security.
pp. 109- 121 ,(2013) ,
10.1007/978-3-642-38631-2_9
4.
Maziar Fotouhi, Abhishek Anand, Ragib Hasan,
PLAG: Practical Landmark Allocation for Cloud Geolocation
international conference on cloud computing.
pp. 1103- 1106 ,(2015) ,
10.1109/CLOUD.2015.161
5.
Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou,
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
international conference on security and privacy in communication systems.
pp. 89- 106 ,(2010) ,
10.1007/978-3-642-16161-2_6
6.
Fredric Morenius, Nicolae Paladi, Christian Gehrmann,
State of The Art and Hot Aspects in Cloud DataStorage Security
Swedish Institute of Computer Science.
,(2013)
7.
Zachary N. J. Peterson, Mark Gondree, Robert Beverly,
A position paper on data sovereignty: the importance of geolocating data in the cloud
ieee international conference on cloud computing technology and science.
pp. 9- 9 ,(2011) ,
10.5555/2170444.2170453
8.
Hugo Krawczyk,
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
international cryptology conference.
,vol. 2001, pp. 310- 331 ,(2001) ,
10.1007/3-540-44647-8_19
9.
Chetan Jaiswal, Vijay Kumar,
IGOD -- Identifying Geolocation of Cloud Datacenter Hosting Mobile User's Data
mobile data management.
,vol. 2, pp. 34- 37 ,(2015) ,
10.1109/MDM.2015.20
10.
Bruce Schneier, Phil Sutherland,
Applied Cryptography: Protocols, Algorithms, and Source Code in C
,(1993)
来源期刊
Université d'Ottawa / University of Ottawa
2018 年,
Volume: , Issue: ,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...