Author:
Hudic Aleksandar,Islam Shareeful,Kieseberg Peter,Rennert Sylvi,Weippl Edgar R.
Subject
General Computer Science,Theoretical Computer Science
Reference20 articles.
1. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
2. Amazon (2006), Amazon Elastic Compute Cloud (amazon ec2), available at: http://aws.amazon.com/ec2/ (accessed May 1, 2012).
3. Bin, H. and Yuxing, P. (2010), “A novel metadata management scheme in cloud computing”, International Conference on Software Technology and Engineering (ICSTE), pp. V1‐433‐8.
4. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
5. Combining fragmentation and encryption to protect privacy in data storage
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献