On the existence of provably secure cloud computing systems
From MaRDI portal
Recommendations
Cites work
Cited in
(12)- Secure cloud computing based on threshold homomorphic encryption
- Secure key management in the cloud
- A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
- A Cloud Computing Security Model Based on Noninterference
- Cognitive survival model and quantitative analysis for cloud computing systems
- On the deductive security of queries to confidential databases in cloud computing systems
- Flexible access control over verifiable cloud computing services with provable security
- A secure cloud-based IDPS using cryptographic traces and revocation protocol
- On the deductive security of queries to databases with multi-bit records
- Formal security model for virtual machine hypervisors in cloud computing systems
- A Probabilistic Small Model Theorem to Assess Confidentiality of Dispersed Cloud Storage
- Minimal basis of the syzygy module of leading terms
This page was built for publication: On the existence of provably secure cloud computing systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q309152)