首页建筑研究 专题列表

云计算安全研究参考文献

收录时间:2012-11-23 15:25 来源: 信息安全国家重点实验室  作者:冯登国,张敏,张妍,徐震  阅读:0次 评论:0我要评论

内容提示:云计算安全研究中英文参考文献,如 IBM.蓝云解决方案,SUN 云计算架构介绍白皮书,国际电信联盟组织ITU等。

延伸阅读:云安全技术框架 云安全服务 云安全标准 云计算

        英文参考文献:

        [1] IBM Blue Cloud Solution (in Chinese). http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml.

        [2] Sun Cloud Architecture Introduction White Paper (in Chinese). http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf.

        [3] Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22−28.

        [4] International Telegraph Union (ITU) (in Chinese). http://www.itu.int/en/pages/default.aspx.

        [5] Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese). http://www.oasis-open.org/.

        [6] Distributed Management Task Force (DMTF) (in Chinese). http://www.dmtf.org/home.

        [7] Cloud Security Alliance (in Chinese). http://www.cloudsecurityalliance.org.

        [8] Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEEComputer Security Foundations Workshop—CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5−7.

        [9] Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategiesfor data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacyand Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int’l Information Security Conf. Sandton: Springer-Verlag,2007. 385−396.

        [10] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A,Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria:ACM Press, 2006. 89−98.

        [11] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. onSecurity and Privacy. Oakland: IEEE Computer Society, 2007. 321−334. [doi: 10.1109/SP.2007.11].

        [12] Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, YungM, eds. LNCS 3531. New York: Springer-Verlag, 2005. 442−455.

        [13] Malek B, Miri A. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEEInt’l Conf. on Computational Science and Engineering. IEEE Computer Society, 2009. 305−312.

        [14] Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Ning P, Vimercati SDC,Syverson PF, eds. Proc. of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press,2007. 195−203.

        [15] Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the5th Int’l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ebook-viewer.php?url=http://www.ualr.edu/sxyu1/file/SecureComm09_AFKP_ABE.pdf.

        [16] Hong C, Zhang M, Feng DG. AB-ACCS: A cryptographic access control scheme for cloud storage. Journal of Computer Researchand Development, 2010,47(Supplementary issue I):259−265 (in Chinese with English abstract).

        [17] Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. SIAM Journal on Computing, 2003,32(3):586−615.

        [18] Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexibledelegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University ofTwente, 2009.

        [19] Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs.Technical Report, 2009.

        [20] Goh EJ. Secure indexes. Technical Report, Stanford University, 2003. http://eprint.iacr.org/2003/216/.

        [21] Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J. Controlling data in the cloud: Outsourcing computationwithout outsourcing control. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009,Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for ComputingMachinery, 2009. 85−90. [doi: 10.1145/1655008.1655020].

        [22] Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Titsworth FM, ed. Proc. of the IEEEComputer Society Symp. on Research in Security and Privacy. Piscataway: IEEE, 2000. 44−55.

        [23] Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Cachin C, Camenisch J, eds.LNCS 3027. Heidelberg: Springer-Verlag, 2004. 506−522.

        [24] Gentry C. Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int’l Symp. onTheory of Computing. New York: Association for Computing Machinery, 2009. 169−178.

        [25] Juels A, Kaliski B. Pors: Proofs of retrievability for large files. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc. of the 2007ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 584−597.

        [26] Ateniese G, Burns R, Curtmola R. Provable data possession at untrusted stores. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc.of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 598−609.

        [27] Di Pietro R, Mancini LV, Ateniese G. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. onSecurity and Privacy in Communication Netowrks. Turkey: ACM DL, 2008. http://eprint.iacr.org/2008/114.pdf [doi: 10.1145/1460877.1460889].

        [28] Zeng K. Publicly verifiable remote data integrity. In: Chen LQ, Ryan MD, Wang GL, eds. LNCS 5308. Birmingham:Springer-Verlag, 2008. 419−434.

        [29] Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: Sion R,ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 67−76.

        [30] Schwarz T, Ethan SJ, Miller L. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In:Proc. of the 26th IEEE Int’l Conf. on Distributed Computing Systems. IEEE Press, 2006. 12−12. [doi: 10.1109/ICDCS.2006.80].

        [31] Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In:Backes M, Ning P, eds. LNCS 5789. Heidelberg: Springer-Verlag, 2009. 355−370.

        [32] Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E. Airavat: Security and privacy for MapReduce. In: Castro M,eds. Proc. of the 7th Usenix Symp. on Networked Systems Design and Implementation. San Jose: USENIX Association, 2010.297−312.

        [33] Bowers KD, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACMWorkshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications SecurityConf., CCS 2009. New York: Association for Computing Machinery, 2009. 43−54. [doi: 10.1145/1655008.1655015].

        [34] Muntés-Mulero V, Nin J. Privacy and anonymization for very large datasets. In: Chen P, ed. Proc of the ACM 18th Int’l Conf. onInformation and Knowledge Management, CIKM 2009. New York: Association for Computing Machinery, 2009. 2117−2118. [doi:10.1145/1645953.1646333]

        [35] Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search. In: Sion R, ed. Proc. of the 2009 ACM Workshopon Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS2009. New York: Association for Computing Machinery, 2009. 115−126. [doi: 10.1145/1655008.1655025].

        [36] Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. In: Karp B, ed. USENIX Association Proc. ofthe 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005. 7−12.

        [37] Raj H, Nathuji R, Singh A, England P. Resource management for isolation enhanced cloud services. In: Sion R, ed. Proc. of the2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and CommunicationsSecurity Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 77−84. [doi: 10.1145/1655008.1655019].

        [38] Wei J, Zhang X, Ammons G, Bala V, Ning P. Managing security of virtual machine images in a cloud environment. In: Sion R, ed.Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 91−96. [doi: 10.1145/1655008.1655021].

原文网址:http://www.fourtwentydesign.com/research/201211/15175.htm

也许您还喜欢阅读:

云计算安全研究报告(5):云计算安全关键技术研究

云计算安全研究报告(4):云计算安全技术框架建议

云计算安全研究报告(3):云计算安全现状

云计算安全研究报告(2):云计算安全挑战

云计算安全研究报告(1):云计算发展趋势

国家建筑标准设计电子化研究

云计算的基本概念和关键技术


【重要声明】本作品版权归建筑中文网和作者所有,允许以学习、研究之目的转载、复制和传播,但必须在明显位置注明原文出处和作者署名(请参考以下引文格式)且保证内容一致性,不得用于出售、出版、付费数据库或其它商业目的,本站保留追究一切法律责任的权利。投稿信箱
引用复制:网址 QQ/MSN 论文/著作 HTML代码

请告诉我们

请告诉我们您的知识需求以及对本站的评价与建议。
满意 不满意

Email:
2021年最新最全三级片免费观看互动交流平台