

Secure Data Transmission Using Cloud Computing
Abstract
Keywords
References
http://www.mydatacontrol.com.
The need for speed. http://www.technologyreview.com/files/54902/GoogleSpeed charts.pdf.
C. Dwork. The differential privacy frontier. In TCC, 2009.
C. Gentry. Fully Homomorphic Encryption Using Ideal Lattices. In STOC, pages 169–178, 2009.
A. Greenberg. IBM’s Blindfolded Calculator. Forbes, June 2009. Appeared in the July 13, 2009 issue of Forbes magazine.
P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In HotOS, 2011.
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, pages 193–205, 2008.
M. S. Miller. Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
A. Sabelfeld and A. C. Myers. Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications, 21(1):5–19, 2003.
L. Whitney. Microsoft Urges Laws to Boost Trust in the Cloud. http://news.cnet.com/ 8301-1009 3-10437844-83.html.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.