1 minute read

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538

Advertisement

Volume 11 Issue I Jan 2023- Available at www.ijraset.com

[28] Ruan, K., Cloud Forensics :Challenges and Opportunities, Presentation from Center of Cybercrime andInvestigation. UniversityCollege, Dublin

[29] Open Grid Forum‟sOCCI specification at http://www.occi-wg.org/

[30] Trusted ComputingGroup at http://www.trustedcomputinggroup.org

[31] Garfinkel, T., Pfaff,B., Chow, J., Rosenblum, M., and Boneh,D., Terra: A Virtual Machine-Based Platform for Trusted Computing, Proceedings of ACM Symposium on Operating Systems Principles. 2003

[32] Ateniese, G., Burns, R., and Curtmola, R., Provable Data Possession in Untrusted Stores, Proceedings of the 14th ACM conference on Computer and Communication Security,2007

[33] Necula, G., C., Proof-carrying code, Proceedings of 24thACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, 1997

[34] CryptographicMessage Syntaxstandard at http://www.ietf.org/rfc/rfc2630.txt

[35] Lindell, Y., and Pinkas, B., Privacy Preserving Data Mining,Proceedings of 20th Annual International Cryptology Conference. 2000

[36] Boneh, D., and Crescenzo, G., D., Public Key Encryptionwith Keyword Search, Proceedings of Advances in Cryptology, EuroCrypt 2004. Lecture Notes in ComputerScience, Springer

[37] Chor, B., Goldreich, O., Kushilevitz, E., and Madhu Sudan,Proceedings of the 36th Annual 1EEE conference on foundation of Computer Science. 1995

[38] OAuth communitysite at http://www.oauth.net [36] http://blogs.wsj.com/digits/2009/03/08/1214/

[37] Reddy, K.K.M, Macko, P., and Seltzer, M., Provenance forthe cloud, Proceedings of the 8th USENIX conference on File and storagetechnologies, 2010

[38] http://www.oasis-open.org/committees/provision/

[39] National InstituteofStandards and Technologyat http://www.nist.gov.

This article is from: