Balamurugan et al., 2014
| Publication | Publication Date | Title |
|---|---|---|
| KR102247658B1 (en) | Processing of blockchain data based on smart contract behavior executed in a trusted execution environment | |
| Hu et al. | An access control scheme for big data processing | |
| Sharma | Evolution of as-a-Service Era in Cloud | |
| Li et al. | A survey of secure computation using trusted execution environments | |
| AU2018391625A1 (en) | Re-encrypting data on a hash chain | |
| Xue et al. | Security protection of system sharing data with improved CP-ABE encryption algorithm under cloud computing environment | |
| Geng et al. | Did-efed: Facilitating federated learning as a service with decentralized identities | |
| Dewang et al. | Data secure application: An application that allows developers to store user data securely using blockchain and IPFS | |
| Anilkumar et al. | A novel predicate based access control scheme for cloud environment using open stack swift storage | |
| Sharma et al. | MapSafe: A complete tool for achieving geospatial data sovereignty | |
| Chen et al. | One-time, oblivious, and unlinkable query processing over encrypted data on cloud | |
| Kaci et al. | Toward a big data approach for indexing encrypted data in cloud computing | |
| Li et al. | Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains | |
| Balamurugan et al. | Common cloud architecture for cloud interoperability | |
| US11824896B2 (en) | Cross-service rulebook management in a dynamic and adversarial environment | |
| Al-Sabri et al. | Building a cloud storage encryption (cse) architecture for enhancing cloud security | |
| Sudhakar et al. | Effective convolution method for privacy preserving in cloud over big data using map reduce framework | |
| Guo et al. | Secure data sharing technology of medical privacy data in the Web 3.0 | |
| Li et al. | Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things | |
| Zhang et al. | Research of ABAC mechanism based on the improved encryption algorithm under cloud environment | |
| Bai et al. | Access control for cloud‐based eHealth social networking: design and evaluation | |
| Chaoui et al. | Comprehensive data life cycle security in cloud computing: current mastery and major challenges | |
| Zhang et al. | Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter | |
| To et al. | Trustedmr: A trusted mapreduce system based on tamper resistance hardware | |
| Gupta et al. | Hybrid Multi-User Based Cloud Data Security for Medical Decision Learning Patterns |