L’adozione del Cloud computing come strategia di cybersicurity. La bibliografia
Pubblichiamo di seguito la bibliografia completa dell’articolo “L’adozione del Cloud computing come strategia di cybersicurity”, scritto da Antonino Nocera sul numero di ottobre-novembre 2020 di Sistemi&Impresa.
Dhote C. A. (2016), “Homomorphic encryption for security of cloud data”, Procedia computer science, 79, 175-181.
Samarati P. (2014), “Data security and privacy in the cloud”, ISPEC, 28-41.
De Capitani S., Di Vimercati S., Foresti S., Jajodia S., Paraboschi, Samarati P. (2013), “Integrity for join queries in the cloud”, Cloud computing IEEE transactions on, 1 (2), 187-200.
Xie M., Wang H., Yin J., Meng X., “Integrity auditing of outsourced data”(2007), Proceedings of the 33rd international conference on very large data bases, 782-793.
Hacigumus H., Iyer B., Mehrotra S. (2004), “Ensuring the integrity of encrypted databases in the database-as-a-service model”, Data and Applications Security XVII, Springer, 61-74.
Li J., Chen X., Li J., Jia C., Ma J., Lou W. (2013), “Fine-grained access control system based on outsourced attribute-based encryption”, Computer security-ESORICS, Springer, 592-609.
Pang H., Jain A., Ramamritham K., Tan K. L. (2005), “Verifying completeness of relational query results in data publishing”, Proceedings of the 2005 ACM SIGMOD international conference on management of data, 407-418.
Merkle R. C., “A certified digital signature” (1989), Advances in cryptology-CRYPT089 proceedings, 218-238.
.