[1]
Hummen, R., Henze, M., Catrein, D., & Wehrle, K. (2012, December). A Cloud design for user-controlled storage and processing of sensor data. In Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on (pp.232-240.
DOI: 10.1109/cloudcom.2012.6427523
Google Scholar
[2]
Mon, E. E., & Naing, T. T. (2011, October). The privacy-aware access control system using attribute-and role-based access control in private cloud. InBroadband Network and Multimedia Technology (IC-BNMT), 2011 4th IEEE International Conference on (pp.447-451.
DOI: 10.1109/icbnmt.2011.6155974
Google Scholar
[3]
Yang, K., Jia, X., & Ren, K. (2012). DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. IACR Cryptology ePrint Archive, 2012, 419.
DOI: 10.1109/infcom.2013.6567100
Google Scholar
[4]
Nabeel, M., & Bertino, E. (2013). Privacy Preserving Delegated Access Control in Public Clouds.
Google Scholar
[5]
Masood, R., & Shibli, M. A. (2012, August). Comparative Analysis of Access Control Systems on Cloud. In Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD), 2012 13th ACIS International Conference on (pp.41-46.
DOI: 10.1109/snpd.2012.33
Google Scholar
[6]
Nabeel, M., Bertino, E., Kantarcioglu, M., & Thuraisingham, B. (2011, October). Towards privacy preserving access control in the cloud. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on (pp.172-180.
DOI: 10.4108/icst.collaboratecom.2011.247061
Google Scholar
[7]
Lu, Y., Zhang, J., Wu, S., & Zhang, S. (2012, August). A Hybrid Dynamic Load Balancing Approach for Cloud Storage. In Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on (pp.1332-1335). IEEE.
DOI: 10.1109/icicee.2012.353
Google Scholar
[8]
C. C., & Naing, T. T. (2011, September). The efficient data storage management system on cluster-based private cloud data center. In Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on (pp.235-239). IEEE.
DOI: 10.1109/ccis.2011.6045066
Google Scholar
[9]
Itani, W., Kayssi, A., & Chehab, A. (2009, December). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. InDependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on (pp.711-716.
DOI: 10.1109/dasc.2009.139
Google Scholar
[10]
Beaty, K., Kundu, A., Naik, V., & Acharya, A. (2013). Network-level Access Control Management for the Cloud.
DOI: 10.1109/ic2e.2013.18
Google Scholar