Abstract is missing.
- Secure access to outsourced dataRobert H. Deng. 1-2 [doi]
- Characterizing hypervisor vulnerabilities in cloud computing serversDiego Perez-Botero, Jakub Szefer, Ruby B. Lee. 3-10 [doi]
- Verification of data redundancy in cloud storageZhan Wang, Kun Sun, Jiwu Jing, Sushil Jajodia. 11-18 [doi]
- Proofs of retrievability with public verifiability and constant communication cost in cloudJiawei Yuan, Shucheng Yu. 19-26 [doi]
- RAFR: remote assessment of file redundancySumanta Sarkar, Reihaneh Safavi-Naini, Liang Feng Zhang. 27-32 [doi]
- How to use attribute-based encryption to implement role-based access control in the cloudYan Zhu 0001, Di Ma, Changjun Hu, Dijiang Huang. 33-40 [doi]
- PRAM: privacy preserving access management scheme in cloud servicesJinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang. 41-46 [doi]
- Hub: heterogeneous bucketization for database outsourcingLei Xu, Xiaoxin Wu. 47-54 [doi]
- Secure k-NN computation on encrypted cloud data without sharing key with query usersYouwen Zhu, Rui Xu, Tsuyoshi Takagi. 55-60 [doi]
- Verifying correctness of inner product of vectors in cloud computingGang Sheng, Tao Wen, Quan Guo, Ying Yin. 61-68 [doi]