A guide to the SQL standard
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Privacy-Enhancing e-Business Model Based on Infomediaries
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Obfuscated databases and group privacy
Proceedings of the 12th ACM conference on Computer and communications security
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Trusted virtual platforms: a key enabler for converged client devices
ACM SIGOPS Operating Systems Review
Privacy policy enforcement in enterprises with identity management solutions
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
P2P reputation management: Probabilistic estimation vs. social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Risk Modeling, Assessment, And Management
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Decentralized generation of multiple, uncorrelatable pseudonyms without trusted third parties
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
A dynamic user-integrated cloud computing architecture
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
A software watermark based architecture for cloud security
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
An autonomic cloud environment for hosting ECG data analysis services
Future Generation Computer Systems
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Reference deployment models for eliminating user concerns on cloud security
The Journal of Supercomputing
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS
Proceedings of the 1st International Workshop on Cloud Intelligence
How to federate VISION clouds through SAML/Shibboleth authentication
ESOCC'12 Proceedings of the First European conference on Service-Oriented and Cloud Computing
Users' Acceptance of Cloud Computing in Saudi Arabia: An Extension of Technology Acceptance Model
International Journal of Cloud Applications and Computing
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Security and privacy for storage and computation in cloud computing
Information Sciences: an International Journal
DocCloud: A document recommender system on cloud computing with plausible deniability
Information Sciences: an International Journal
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
Lockbox: mobility, privacy and values in cloud storage
Ethics and Information Technology
Hi-index | 0.00 |
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.