Data Sharing Accountability in Cloud
Abstract
Keywords
Full Text:
PDFReferences
P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.
E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.
D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.
P. Buneman, A. Chapman, and J. Cheney, “Provenance Management in Curated Databases,” Proc. ACM SIGMOD Int‟l Conf. Management of Data (SIGMOD ‟06), pp. 539-550, 2006.
B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int‟l Conf. System Sciences (HICSS), 2004.
OASIS Security Services Technical Committee, “Security Assertion Markup Language (saml) 2.0,” http://www.oasis-open.org/ committees/tc home.php?wg abbrev=security, 2012.
R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int‟l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.
P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009
S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Proc. First Int‟l Conf. Cloud Computing, 2009.
Ensuring Distributed Accountability For Data Sharing In The Cloud Smitha Sundareswaran, Anna C. Squicciarini, Member, Ieee, And Dan Lin , Ieee Transactions On Dependable And Secure Computing, Vol. 9, No. 4, July/August 2012
P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, “Towards a Theory of Accountability and Audit,” Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009.
Flickr, http://www.flickr.com/, 2012.
Smitha sundareswaran and Anna C.squiccaiarni, “Ensuring distributed data sharing accountability in cloud,” proc. IEEE vol 9, no 4 July/August 2012.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.