References
- M. Tan and X. Su, Media Cloud: When Media Revolution Meets Rise of Cloud Computing, Proc. of The 6th IEEE International Symposium Service Oriented System Engineering(SOSE2011), pp. 251-261, 2011.
- W. Zhu et al., Multimedia Cloud Computing, IEEE SIGNAL PROCESSING MAGAZINE. pp. 59-69, 2011.
- http://www.icloud.com/
- http://www.amazon.com/gp/feature.html/refcd_nav_lm?ie=UTF8&docId=1000796931
- http://www.google.com/intl/ko/drive/
- http://www.uvvu.com/
- Microsoft, Microsoft PlayReady Content Access Technology, White Paper, 2008.
- http://www.marlin-community.com/
- http://www.openmobilealliance.org/
- H. Lee, C, Heo, C, Seo, and S. U. Shin, Design and Implementation of DRM Proxy for DRM Cloud, KIPS Trans. on Comp. and Comm. Sys, Vol. 2, No. 9, pp. 553-560, 2012. https://doi.org/10.3745/KTCCS.2013.2.12.553
- H. Lee, C. Seo, and S. U, Shin, DRM Cloud Architecture and Service Scenario for Content Protection, Journal of Internet Services and Information Security, Vol. 3, No 3, pp. 94-105, 2013.
- N. Papanikolaou, S. Pearson, M. C. Mont, and R. Ko, A Toolkit for Automating Compliance in Cloud Computing Services, International Journal of Cloud Computing, Vol. 3, No. 1, pp. 46-68, 2014.
- R. Accorsi, A secure log architecture to support remote auditing, Mathematical and Computer Modelling, Vol. 57, pp. 1578-1791, 2013. https://doi.org/10.1016/j.mcm.2012.06.035
- A. Gehani, G. F. Ciocarlie, and N. Shankar, Accountable Clouds, 2013 IEEE International Conference on Technologies for Homeland Securith(HST), pp. 403-407, 2013.
- J. Yao, S. Chen, and C. Wang, Accountability as a Service for the Cloud, 2010 IEEE International Conference on Services Computing, pp. 81-88, 2010.
- R. K. L. Ko, Data Accountability in Cloud Systems, Security, Privacy and Trust in Cloud Systems, pp. 211-238, Springer-Verlag, 2014.
- R. K. L. Ko et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing, 2011 IEEE World Congress on Services, pp. 584-588, 2011.
- O. Q. Zhan, M. Krichberg, R. K L Ko, and B. S. Lee, How to Track Your Data: The case for Cloud Computing Provenance, 2011 IEEE International Conference on Cloud Computing Technology and Science, pp. 446-453, 2011.
- O. Q. Zhang, R. K L Ko, M. Kirchberg, C. H. Suen, P. Jagadpramana, B. S. Lee, How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms, 2012 IEEE 2011 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 1429-1437, 2012.
- R. K. L. Ko, P. Jagadpramana, and B. S. Lee, Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, 2011 IEEE 10th International Conference of on Trust, Security and Privacy in Computing and Communications(TrustCom), pp. 765-771, 2011.
- http://www.highcloudsecurity.com/resources/whitepapers
- S. Pearson et al., Accountability for Cloud and Other Future Internet Services, IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 629-632, 2012.
- http://www.a4cloud.eu/