


default search action
Journal of Information Security and Applications, Volume 27-28
Volume 27-28, April - May 2016
- Feng Hao

, Xun Yi
, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. 1-2 - Vladimir Rabotka, Mohammad Mannan:

An evaluation of recent secure deduplication proposals. 3-18 - Omar Ali

, Jeffrey Soar
, Jianming Yong
:
An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments. 19-34 - Bernd Zwattendorfer, Daniel Slamanig

:
The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality. 35-53 - Fatema Rashid, Ali Miri, Isaac Woungang:

Secure image deduplication through image compression. 54-64 - Canh Ngo

, Yuri Demchenko
, Cees de Laat:
Multi-tenant attribute-based access control for cloud infrastructure services. 65-84 - Chetan Jaiswal, Vijay Kumar:

IGOD: identification of geolocation of cloud datacenters. 85-102 - Wen Zeng, Maciej Koutny, Paul Watson

, Vasileios Germanos:
Formal verification of secure information flow in cloud computing. 103-116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














