Funder
National Research Foundation of Korea
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference20 articles.
1. Ghosh A, Arce I (2010) Guest editors’ introduction: in cloud computing we trust—but should we? IEEE Secur Priv. doi:
10.1109/msp.2010.177
2. Habib S, Hauke S, Ries S, Muhlhauser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl. doi:
10.1186/2192-113x-1-19
3. STAR (security, trust and assurance registry) program (2011). In: Cloud Security Alliance, Accessed from
https://cloudsecurityalliance.org/star/#_overview
. Accessed 7 July 2016
4. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Paper presented at the Proceedings of the 13th Conference on USENIX Security Symposium, vol 13, San Diego, CA
5. Edman M, Yener B (2009) On anonymity in an electronic society: a survey of anonymous communication systems. ACM Comput Surv 42(1):1–35. doi:
10.1145/1592451.1592456
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献