-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
186 lines (186 loc) · 6.66 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
@misc{soumu,
author="総務省",
title="自治体クラウドに関する調査研究報告書",
note="\url{http://www.soumu.go.jp/main_content/000175572.pdf}"
}
@misc{ovf,
author = {{Distributed Management Task Force}},
title = {{Open Virtualization Format White Paper}},
howpublished = {\\http://dmtf.org/sites/default/files/standards/documents/DSP2017\_2.0.0a.pdf},
urldate = {08/03/14},
year = {2012},
month = Jul
}
@misc{tosca,
author = {{OASIS Standard}},
title = {{Topology and Orchestration Specification for Cloud Applications Version 1.0}},
howpublished = {\\http://docs.oasis-open.org/tosca/TOSCA/v1.0/os/TOSCA-v1.0-os.html},
urldate = {08/03/14},
year = {2013},
month = Nov
}
@misc{cscc,
author = {{Cloud Standards Customer Council}},
title = {{Cloud Standards Customer Council Core Document}},
howpublished = {http://www.cloud-council.org/Cloud-Council\_Core\_Document.pdf},
urldate = {08/03/14},
year = {2011},
month = Apr
}
@misc{openstack,
title = {{OpenStack Open Source Cloud Computing Software}},
howpublished = {http://www.openstack.org/},
urldate = {08/03/14},
}
@misc{cloudstack,
title = {{Apache CloudStack: Open Source Cloud Computing}},
howpublished = {http://cloudstack.apache.org/},
urldate = {08/03/14},
}
@misc{eucalyptus,
title = {{Eucalyptus | Open Source Private Cloud Software}},
howpublished = {https://www.eucalyptus.com/},
urldate = {08/03/14},
}
@misc{dataportability,
title = {{DataPortability.org - Share and remix data using open standards}},
howpublished = {http://dataportability.org/},
urldate = {08/03/14},
}
@misc{takeout,
title = {{Google Takeout}},
howpublished = {https://www.google.com/settings/takeout/},
urldate = {08/03/14},
}
@misc{openstandard,
author = {{European Communities}},
title = {{European Interoperability Framework for Pan-European eGovernment Services}},
howpublished = {{http://ec.europa.eu/idabc/servlets/Doca2cd.pdf}},
urldate = {08/03/14},
year = {2004}
}
@misc{sidechannel,
author = {{﨑山一男, 太田和夫}},
title = {{暗号への脅威「サイドチャネル攻撃」とその対策}},
howpublished = {http://sakiyama-lab.jp/wp-content/uploads/kagaku2008.pdf},
urldate = {08/04/14},
}
@article{kocher1999,
author = {Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
journal = {Advances in Cryptology — CRYPTO’ 99},
volume={1666},
pages = {388--397},
title = {{Differential Power Analysis}},
year = {1999}
}
@misc{vmsec,
author = {{須崎有康}},
title = {{Cloud ComputingにおけるVMのセキュリティ}},
howpublished = {http://www.slideshare.net/suzaki/cloud-computingvm14jan2010/},
urldate = {08/04/14},
}
@misc{cloudrisk,
author = {ENISA},
title = {クラウドコンピューティング:情報セキュリティに関わる利点、リスク及び推奨事項},
year = {2009},
note = {https:{\slash}{\slash}www.ipa.go.jp{\slash}security{\slash}publications{\slash}enisa{\slash}documents{\slash}Cloud%20Computing%20Security%20Risk%20Assessment.pdf},
}
@article{chen2008,
author = {Chen, Xiaoxin and Garfinkel, Tal and Lewis, E. Christopher and Subrahmanyam, Pratap and Waldspurger, Carl A. and Boneh, Dan and Dwoskin, Jeffrey and Ports, Dan R.K.},
journal = {SIGPLAN Notices},
volume = {43},
number = {3},
month = Mar,
year = {2008},
pages = {2--13},
title = {{Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems}}
}
@article{ristenpart2009,
author = {Ristenpart, Thomas and Tromer, Eran and Shacham, Hovav and Savage, Stefan},
title = {Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds},
journal = {Proceedings of the 16th ACM Conference on Computer and Communications Security},
year = {2009},
pages = {199--212}
}
@misc{sealand,
author = {WIRED},
title = {「独立国」を使って「ネット・データ・ヘイブン」を提供(上)},
howpublished = {http://wired.jp/2000/06/06/「独立国」を使って「ネット・データ・ヘイブン/},
}
@misc{dataheaven,
author = {weblio},
title = {データヘイブンとは},
howpublished = {http://www.weblio.jp/content/データ・ヘイブン},
}
@misc{ediscovery,
author = {ITpro},
title = {知っておきたいIT経営用語-e-ディスカバリー},
howpublished = {\\http://itpro.nikkeibp.co.jp/article/Keyword/20080618/308603/},
}
@misc{ediscoveryblog,
author = {eDiscoveryBlog},
title = {Eディスカバリーの最新情報を日本へ},
howpublished = {http://ediscoveryblog.ji2.co.jp/?cat=24},
}
@Conference{sym,
author = {清藤 武暢},
title = {「暗号化状態処理技術」を巡る最新動向},
booktitle = {第15回情報セキュリティ・シンポジウム},
}
@Misc{uzi,
author = {近江法律事務所},
title = {業務委託先からの情報流出と賠償責任},
note = "\url{http://www.oumilaw.jp/kouza/35.html}",
}
@Misc{mitubisi,
author = {三菱電機},
title = {ニュースリリース 「秘匿検索基盤ソフトウェア」を開発},
note = {www.mitsubishielectric.co.jp/news/2013/0703-a.html},
year = 2013,
}
@InProceedings{nict,
author ={Lihua Wang, Atsushi Waseda, Ryo Nojima and Shiho Moriai},
title = {Proxy Re-encryption with INd-Cca security in Encrypted file Storage System},
booktitle = {SCIS2014: The 31st Symposium on Cryptography and Information Security Kagoshima},
year = 2014
}
@Misc{fujitsu,
author = {富士通},
title = {暗号化したまま検索が可能な秘匿検索技術を開発},
note = "\url{http://pr.fujitsu.com/jp/news/2014/01/15.html}",
year = 2014,
}
@Misc{toshiba,
author = {東芝ソリューション},
title = {ニュースリリース|2011年11月9日 安全性を高めた、クラウドサービス向け再暗号化技術を開発},
note = "\url{http://www.toshiba-sol.co.jp/news/detail/111109.htm}",
year = 2011,
}
@Misc{hitachi,
author = {日立製作所},
title = {ニュースリリース:2014年1月21日:日立},
note = "\url{http://www.hitachi.co.jp/New/cnews/month/2014/01/0121b.html}",
year = 2014,
}
@Misc{nrimicrosoft,
author = {NRI SecureTechnologies,Ltd.},
title = {世界分散ストレージサービス | サービス案内 | 情報セキュリティのNRIセキュア},
note = "\url{http://www.nri-secure.co.jp/service/global/gss.html}",
year = 2011,
}
@Misc{ntt,
author = {NTTソフトフェア},
title = {社内ストレージと同様の使い勝手でらくらく利用「TrustBind/Hybrid Storage」 | NTTソフトウェア},
note = "\url{https://www.ntts.co.jp/whatsnew/2013/140325.html}",
year = 2014,
}
@Techreport{sdsm,
author = {西川 律子},
title = {秘密分散法},
institution = {沖テクニカルレビュー},
year = 2006,
number = 1,
volume = 73,
month = 1,
note = "\url{https://www.oki.com/jp/Home/JIS/Books/KENKAI/n205/pdf/205_R18.pdf}",
}