1 |
Y.Yun, B.Kim, "Mobile Cloud Computing Technology Trend", NIPA, Weekly Technology Trend Vol.1439, pp.28-39, 2010.
|
2 |
V. Goyal, O.ng Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," Association for Computing Machinery, in Proc. of CCS'06, 2006.
|
3 |
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," IEEE Computer Society, Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp.321-334, 2007.
|
4 |
M. Blaze, G. Bleumer and M. Strauss, "Divertible protocols and atomic proxy cryptography", EUROCRYPT, Proceedings of Eurocrypt '98, Volume 1403, 1998.
|
5 |
J. Benaloh, M. Chase, E. Horvitz and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," Association for Computing Machinery, Proceedings of the 2009 ACM workshop on Cloud computing security, pp.103-114, 2009.
|
6 |
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel and W. Jonker, "Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes," 2009 University of Twente, Centre for Telematics and Information Technology, Internal Report, 2009.
|
7 |
D.Kim, K.Jang, D.Shin, "Healthcare System using Agent Platform in Ubiquitous Environment,", Korean Society For Internet Information, Proceedings of Korean Society For Internet Information, pp. 139-142, 2006
|
8 |
Y.Min, H.Kim, Y.Kim, "Distributed File System Technology for Cloud Computing," Korean Institute of Information Scientists and Engineers, pp.86-94, 2009.
|
9 |
D.Yu, S.Jeong, T.Kim, "TIPC Application and Analysis for Network I/O Performance Evaluation in Hadoop based Distributed Computing," Korean Institute of Information Scientists and Engineers, pp.351-359, 2009.
|
10 |
O.Min, H.Kim, G.Nam, "Cloud Computing Technology Trend," ETRI, ETTrends, Vol.24 No.4, pp.1-13, 2009.
|
11 |
H.Kim, U.Min, G.Nam, "Mobile Cloud Computing Technology Trend," ETRI, ETTrends, Vol.25 No.3, pp.40-51, 2010.
|
12 |
S.C. Yu, C. Wang, K.I. Ren and W.J. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," INFOCOM, 2010 Proceedings IEEE, pp.321-334, 2010.
|
13 |
T. Mather, S. Kumaraswamy and S. Latif, "Cloud Security and Privacy," O'Reilly Media, 2009.
|
14 |
CSA, Security Guidance for Critical Areas of Focus Cloud Computing, Vol.2.1, 2009.
|