|
[1]D. Svantesson, R. Clarke, Privacy and consumer risks in cloud computing, computer law & security review, Vol.26, No.4, pp.391-397, 2010. [2]W. Itani, A. Kayssi, A. Chehab, Privacy as a Service: privacy-aware data storage and processing in cloud computing architectures, in: IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC’09, pp.711-716, 2009. [3]M. Descher, P. Masser, T. Feilhauer, A.M. Tjoa, D. Huemer, Retaining data control to the client in infrastructure clouds, in: International Conference on Availability, Reliability and Security, ARES’09, pp.9-16, 2009. [4]Cloud Computing and User Authentication http://blogs.msdn.com/b/dachou/archive/2008/08/19/cloud-computing-and-user-authentication.aspx, Access available 18/6/2011 [5]Strong user authentication on the web http://msdn.microsoft.com/en-us/library/cc838351.aspx, Access available 18/6/2011 [6]B. Ohlman, A. Eriksson, R. Rembarz, What networking of Information can do for cloud computing, in: IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE’09, pp.78-83, 2009. [7]R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, Vol.25, No.6, pp.599-616 , 2009. [8]S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, Vol.34, No.1, pp.1-11, 2011. [9]OpenID http://en.wikipedia.org/wiki/OpenID, Access available 15/3/2012 [10]OpenID: introduction and how to for non-techies http://www.consumingexperience.com/2006/12/openid-introduction.html, Access available 15/3/2012. [11]Apple DRM-Free. http://www.apple.com/pr/library/2007/04/02itunes.html, Access available 20/6/2011. [12]Google DRM-Free. http://books.google.com/support/partner/bin/answer.py?hl=en&answer=170424, Access available 20/6/2011. [13]Google DRM. http://books.google.com/help/ebooks/content.html, Access available 20/6/2011. [14]Google adopts Adobe ebook DRM. http://blogs.adobe.com/digitalpublishing/2010/12/google-ebooks.html, Access available 20/6/2011. [15]Windows Rights Management Services http://technet.microsoft.com/zh-tw/library/cc706990(WS.10).aspx, Access available 1/7/2011. [16]R. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, Vol. 21, No.2, 1978. [17]C.L. Chen, A secure and traceable E-DRM system based on mobile device, Expert systems with applications, Vol. 35, No. 3, pp.878-886 , 2008. [18]C.L. Chen, All-In-One Mobile DRM System Design, International Journal of Innovative Computing, Vol. 6, No. 3A, pp.897-911, 2010. [19]Attribute Exchange Security Alert http://openid.net/2011/05/05/attribute-exchange-security-alert/, Access available 13/1/2012 [20]F.Y. Yang, C.M. Liao, A Provably Secure and Efficient Strong Designated Verifier Signature Scheme, International Journal of Network Security, Vol. 10, No. 3, pp.223-227, 2010. [21]M. Rasslan, A. Youssef, Comments on the security of Chen’s authenticated encryption scheme, Computers and Electrical Engineering, Vol. 37, No. 1, pp.71-74, 2011. [22]C.C. Chang, J.S. Lee, An anonymous voting mechanism based on the key exchange protocol, Computers & Security, Vol. 25, No. 4, pp.307-314, 2006. [23]C.C. Chang, T.F. Cheng, An efficient proxy raffle protocol with anonymity-preserving, Computer Standards & Interfaces, Vol. 31, No. 4, pp.772-772, 2009. [24]Y.Y. Chen, J.K. Jan, C.L. Chen, The design of a secure anonymous Internet voting system, Computers & Security, Vol. 23, No. 4, pp.330-337, 2004.
|