 Open Access
				Open Access 
				 Subscription or Fee Access
									Subscription or Fee Access
							Secure Data Transmission Using Cloud Computing
Abstract
Keywords
References
http://www.mydatacontrol.com.
The need for speed. http://www.technologyreview.com/files/54902/GoogleSpeed charts.pdf.
C. Dwork. The differential privacy frontier. In TCC, 2009.
C. Gentry. Fully Homomorphic Encryption Using Ideal Lattices. In STOC, pages 169–178, 2009.
A. Greenberg. IBM’s Blindfolded Calculator. Forbes, June 2009. Appeared in the July 13, 2009 issue of Forbes magazine.
P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In HotOS, 2011.
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, pages 193–205, 2008.
M. S. Miller. Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
A. Sabelfeld and A. C. Myers. Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications, 21(1):5–19, 2003.
L. Whitney. Microsoft Urges Laws to Boost Trust in the Cloud. http://news.cnet.com/ 8301-1009 3-10437844-83.html.
Refbacks
- There are currently no refbacks.
 
	This work is licensed under a Creative Commons Attribution 3.0 License.
 
 
  
  
  
  
  Email this article
			Email this article