Login / Signup

Shielding Applications from an Untrusted Cloud with Haven.

Andrew BaumannMarcus PeinadoGalen C. Hunt
Published in: ACM Trans. Comput. Syst. (2015)
Keyphrases
  • cloud computing
  • third party
  • privacy preserving
  • security policies
  • data center
  • e learning
  • knowledge base
  • image processing
  • open source
  • virtual machine
  • data privacy
  • cloud services