|
[1] Dropbox. https://www.dropbox.com. [2] Google docs. https://docs.google.com. [3] .net framework cryptographic services. http://msdn.microsoft.com/en-us/ library/92f9ye3s.aspx/. [4] Windows communication foundation. http://msdn.microsoft.com/en-us/ library/ms731082.aspx. [5] Xenserver. http://www.citrix.com/products/xenserver/overview.html. [6] Zen load balancer. http://www.zenloadbalancer.com/. [7] Microsoft virtual studio 2012. http://www.microsoft.com/visualstudio/ eng/office-dev-tools-for-visual-studio/, 2012. [8] Anne Adams and Martina Angela Sasse. Users are not the enemy. Communi- cations of the ACM, 42(12):40{46, 1999. [9] Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing. http://www.cloudsecurityalliance.org, 2009. [10] Casati F. Kuno H. Machiraju V. Alonso, G. Web Services: Concepts, Archi- tectures and Applications. Springer,Heidelberg, 2004. [11] Mikhail J Atallah, Florian Kerschbaum, and Wenliang Du. Secure and private sequence comparisons. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pages 39{44. ACM, 2003. [12] Don Box, David Ehnebuske, Gopal Kakivaya, Andrew Layman, Noah Mendel- sohn, Henrik Frystyk Nielsen, Satish Thatte, and Dave Winer. Simple object access protocol (soap) 1.1, 2000. [13] Hilary Cotter and Michael Coles. Pro Full-Text Search in SQL Server 2008. Apress, 2008. [14] Jayramsingh Doma Doomun, Razvi and Sundeep Tengur. AES-CBC software execution optimization. In Information Technology, 2008. ITSim 2008. Inter- national Symposium on. Vol. 1. IEEE, 2008. [15] Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J Strauss, and Rebecca N Wright. Secure multiparty computation of approximations. In Automata, Languages and Programming, pages 927{938. Springer, 2001. [16] Armando Fox, Rean Grith, A Joseph, R Katz, A Konwinski, G Lee, D Pat- terson, A Rabkin, and I Stoica. Above the clouds: A berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of Califor- nia, Berkeley, Rep. UCB/EECS, 28, 2009. [17] Craig Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. [18] B. Gladman. Advanced encryption standard call. http://www.nist.gov/aes/, 1997. [19] B. Gladman. A specication for rijndael, the aes algotithm. http://www.fp. gladman.plus.com/, 2001. [20] Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM (JACM), 43(3):431{473, 1996. [21] Doug Gross. Yahoo hacked, 450,000 passwords posted online. http://edition. cnn.com/2012/07/12/tech/web/yahoo-users-hacked, 2012. [22] Shengyue Ji, Guoliang Li, Chen Li, and Jianhua Feng. Ecient interactive fuzzy keyword search. In Proceedings of the 18th international conference on World wide web, pages 371{380. ACM, 2009. [23] Martin Westergaard Jrgensen. Introduction to rainbow tables. http://www. freerainbowtables.com/articles/introduction_to_rainbow_tables/. [24] Burt Kaliski. "pkcs# 5: Password-based cryptography specication version 2.0. http://tools.ietf.org/html/rfc2898, 2000. [25] D. Kotzinos and N. Chrysoulakis. Design of GIS Web Services for Environ- mental Monitoring: Using Satellite Imaging to Calculate Vegetation Indices. In Proceedings of the International Symposium on GIS and Remote Sensing, Volos, Creece., 2003. [26] Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1{5. IEEE, 2010. [27] Alex Mackey. Windows communication foundation. In Introducing. NET 4.0, pages 159{173. Springer, 2010. [28] Declan McCullagh. Yahoo breach: Swiped passwords by the numbers. http://news.cnet.com/8301-1009_3-57470878-83/ yahoo-breach-swiped-passwords-by-the-numbers/?tag=txt;title, 2012. [29] Peter Mell and Tim Grance. Draft nist working denition of cloud computing. Referenced on June. 3rd, 2009. [30] ALISTAIR AUTOR MOFFAT, Timothy C Bell, et al. Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann Pub, 1999. [31] Robert Morris and Ken Thompson. Password security: A case history. In Communications of the ACM 22.11, pages 594{597, 1979. [32] Philippe Oechslin. Making a faster cryptanalytic time-memory trade-o. In Advances in Cryptology-CRYPTO 2003, pages 617{630, 2003. [33] Handshake Protocol and SSL Change Cipher Spec. Secure socket layer (ssl). [34] M Rejman-Greene. Biometricsreal identities for a virtual world. BT Technology Journal, 19(3):115{121, 2001. [35] Dawn Xiaoding Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, pages 44{55. IEEE, 2000. |