


default search action
Journal of Information Security and Applications, Volume 27-28
Volume 27-28, April - May 2016
- Feng Hao
, Xun Yi
, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. 1-2 - Vladimir Rabotka, Mohammad Mannan:
An evaluation of recent secure deduplication proposals. 3-18 - Omar Ali
, Jeffrey Soar
, Jianming Yong
:
An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments. 19-34 - Bernd Zwattendorfer, Daniel Slamanig
:
The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality. 35-53 - Fatema Rashid, Ali Miri, Isaac Woungang:
Secure image deduplication through image compression. 54-64 - Canh Ngo
, Yuri Demchenko
, Cees de Laat:
Multi-tenant attribute-based access control for cloud infrastructure services. 65-84 - Chetan Jaiswal, Vijay Kumar:
IGOD: identification of geolocation of cloud datacenters. 85-102 - Wen Zeng, Maciej Koutny, Paul Watson
, Vasileios Germanos:
Formal verification of secure information flow in cloud computing. 103-116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.