لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
N. Leavitt, _ cloud computing really ready for prime time?" ...
P.Mell and T. Grance, _ nist definition of cloud computing, ...
F. Berman, G.Fox, andA. J. G. Hey, Grid Computing :Making ...
M. A. Shah, R. Swaminathan, and M. Baker, ، Privacy-pre ...
Z. Xiao andY.Xiao, "Security and privacy in cloud computing, " ...
N. Kshetri, "Privacy and security issues in cloud computing: the ...
R. Latif, H. Abbas, S. Assar, and Q. Ali, :Cloud ...
A. Avi zienis, J. Laprie, B. Randell, and C. Landwehr, ...
Z. Mahmood, "Data location and security issues in cloud computing, ...
D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying ...
A. Pandey, R. M. Tugnayat, and A. K. Tiwari, :Data ...
D. A. Klein, "Data security for digital data storage, U.S. ...
M. Y. A. Younis and K. Kifayat, :Secure cloud computing ...
new security and privacy framework A:ه [14] S. Kardas, S. ...
A. Behl, "Emerging security challenges in cloud computing: an insight ...
D. Chen and H. Zhao, :Data security and privacy protection ...
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of ...
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: a ...
J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. ...
D. H. Rakesh, R. R. Bhavsar, and A. S. Thorve, ...
R. L. Rivest, L. Adleman, andM. L.Dertouzos, _ data banks ...
C. Gentry, A fully homomorphic encryption scheme [Ph.D. thesis], Stanford ...
D. Boneh, "The decision Diffe -Hellman problem, " in Algorithmic ...
A. Kaur and M. Bhardwaj, "Hybrid encryption for cloud database ...
R. Arora, A. Parashar, and C. C. I. Transforming, "Secure ...
D. Manivannan and R. Sujarani, "Light weight and Secure database ...
F. Pagano and D. Pagano, "Using in-memory encrypted databases on ...
K.Huang and R. Tso, _ commutative encryption scheme based on ...
N. Cao, C. Wang, M. Li, K. Ren, and W. ...
M. A. AlZain, B. Soh, and E. Pardede, "Mcdb: using ...
C. P. Ram and G. Sreenivaasan, "Security as a service ...
M. Asad Arfeen, K. Pawlikowski, and A. Willig, ":A framework ...
A. Rao, "Centralized database security in cloud, " International Journal ...
E. M.Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data ...
S. Biedermann and S. Katzenb eisser, "POSTER: event-based isolation of ...
C. Delettre, K. Boudaoud, and M. Riveill, :Cloud computing, security ...
Y. Tang, P. P. C. Lee, J. C. S. Lui, ...
J. Krumm, _ survey of computational location privacy, ; Personal ...
S. Pearson and A. Benameur, "Privacy, security and trust issues ...
E. Stefanov, M. van Dijk, E. Shi et al., "Path ...
S. Paquette, P. T. Jaeger, and S. C. Wilson, "Identifying ...
S. Subashini and V. Kavitha, _ survey On security issues ...
C. Cachin and M Schunter, "A cloud you can trust, ...
of Fraudulent Resource Attribution؛ه [44] J. Idziorek, M. Tannian, and ...
Z. Shen, L. Li, F. Yan, and X. Wu, :Cloud ...
R. Neisse, D. Holling, and A. Pretschner, "Implementing trust in ...
R. Yeluri, E. Castro-Leon, R. R. Harmon, and J. Greene, ...
R. Ranchal, B. Bhargava, L. B. Othmane et al., "Protection ...
A. Squicciarini, S. Sundare Swaran, and D. Lin, "Preventing information ...
K. Hwang and D. Li, _ cloud computing with secure ...
نمایش کامل مراجع