Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Cloud security is not (just) virtualization security: a short paper
Proceedings of the 2009 ACM workshop on Cloud computing security
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Providing a data location assurance service for cloud storage environments
Journal of Mobile Multimedia
Lockbox: mobility, privacy and values in cloud storage
Ethics and Information Technology
Hi-index | 48.22 |
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.