Engineering Cryptography for Security and Privacy in the Cloud

被引:0
|
作者
Krenn, Stephan [1 ]
Loruenser, Thomas [1 ]
Striecks, Christoph [1 ]
机构
[1] AIT Austrian Inst Technol GmbH, Vienna, Austria
来源
ERCIM NEWS | 2018年 / 113期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A large body of research in cryptography was established over recent decades but little of it has been commercialised. This is to the detriment of cloud computing, where the new methods would help to establish end-to-end security, which is not yet common practice.
引用
收藏
页码:53 / 54
页数:2
相关论文
共 50 条
  • [21] Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
    Kanade, Sanjay G.
    Petrovska-Delacrétaz, Dijana
    Dorizzi, Bernadette
    Synthesis Lectures on Information Security, Privacy, and Trust, 2012, 3 (01): : 1 - 142
  • [22] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [23] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [24] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [25] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [26] Multiuser Privacy and Security Conflicts in the Cloud
    Alhelali, Eman
    Ramokapane, Kopo M.
    Such, Jose
    PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
  • [27] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23
  • [28] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [29] Privacy and Security Security for Mobile and Cloud Frontiers in Healthcare
    Kotz, David
    Fu, Kevin
    Gunter, Carl
    Rubin, Avi
    COMMUNICATIONS OF THE ACM, 2015, 58 (08) : 21 - 23
  • [30] Evaluating Security and Privacy in Cloud Services
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Shiva, Sajjan
    Sheldon, Frederick T.
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 683 - 686