
1 minute read
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
by IJRASET

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Advertisement
Volume 11 Issue I Jan 2023- Available at www.ijraset.com
[28] Ruan, K., Cloud Forensics :Challenges and Opportunities, Presentation from Center of Cybercrime andInvestigation. UniversityCollege, Dublin
[29] Open Grid Forum‟sOCCI specification at http://www.occi-wg.org/
[30] Trusted ComputingGroup at http://www.trustedcomputinggroup.org
[31] Garfinkel, T., Pfaff,B., Chow, J., Rosenblum, M., and Boneh,D., Terra: A Virtual Machine-Based Platform for Trusted Computing, Proceedings of ACM Symposium on Operating Systems Principles. 2003
[32] Ateniese, G., Burns, R., and Curtmola, R., Provable Data Possession in Untrusted Stores, Proceedings of the 14th ACM conference on Computer and Communication Security,2007
[33] Necula, G., C., Proof-carrying code, Proceedings of 24thACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, 1997
[34] CryptographicMessage Syntaxstandard at http://www.ietf.org/rfc/rfc2630.txt
[35] Lindell, Y., and Pinkas, B., Privacy Preserving Data Mining,Proceedings of 20th Annual International Cryptology Conference. 2000
[36] Boneh, D., and Crescenzo, G., D., Public Key Encryptionwith Keyword Search, Proceedings of Advances in Cryptology, EuroCrypt 2004. Lecture Notes in ComputerScience, Springer
[37] Chor, B., Goldreich, O., Kushilevitz, E., and Madhu Sudan,Proceedings of the 36th Annual 1EEE conference on foundation of Computer Science. 1995
[38] OAuth communitysite at http://www.oauth.net [36] http://blogs.wsj.com/digits/2009/03/08/1214/
[37] Reddy, K.K.M, Macko, P., and Seltzer, M., Provenance forthe cloud, Proceedings of the 8th USENIX conference on File and storagetechnologies, 2010
[38] http://www.oasis-open.org/committees/provision/
[39] National InstituteofStandards and Technologyat http://www.nist.gov.