{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T02:24:11Z","timestamp":1776997451452,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_30","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"417-429","source":"Crossref","is-referenced-by-count":56,"title":["Token-Based Cloud Computing"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Amazon Elastic Compute Cloud (EC2), http:\/\/aws.amazon.com\/ec2"},{"key":"30_CR2","unstructured":"Amazon Simple Storage Service (S3), http:\/\/aws.amazon.com\/s3"},{"key":"30_CR3","first-page":"216","volume":"54","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Advances in Computers\u00a054, 216\u2013272 (2001)","journal-title":"Advances in Computers"},{"key":"30_CR4","unstructured":"Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., Doorn, L.v.: vTPM: Virtualizing the Trusted Platform Module. In: USENIX Security Symposium (USENIX 2006), pp. 305\u2013320. USENIX Association (2006)"},{"key":"30_CR5","unstructured":"Bussani, A., Griffin, J.L., Jasen, B., Julisch, K., Karjoth, G., Maruyama, H., Nakamura, M., Perez, R., Schunter, M., Tanner, A., Van Doorn, L., Herreweghen, E.V., Waidner, M., Yoshihama, S.: Trusted Virtual Domains: Secure Foundations for Business and IT Services. Technical Report Research Report RC23792, IBM Research (November 2005)"},{"key":"30_CR6","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2010-0376","volume":"18","author":"S. Cabuk","year":"2010","unstructured":"Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.G.V., Ramunno, G., Sadeghi, A.-R., Schunter, M., St\u00fcble, C.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security\u00a018, 89\u2013121 (2010)","journal-title":"Journal of Computer Security"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1655008.1655020","volume-title":"ACM Workshop on Cloud Computing Security (CCSW 2009)","author":"R. Chow","year":"2009","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85\u201390. ACM, New York (2009)"},{"key":"30_CR8","unstructured":"Cloud Security Alliance (CSA). Top threats to cloud computing, version 1.0 (March 2010), http:\/\/www.cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf"},{"key":"#cr-split#-30_CR9.1","unstructured":"Dijk, M.v., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. Cryptology ePrint Archive, Report 2009\/616 (2009), http:\/\/eprint.iacr.org;"},{"key":"#cr-split#-30_CR9.2","unstructured":"To appear at EUROCRYPT 2010"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-642-04474-8_34","volume-title":"Information Security","author":"J.A. Garay","year":"2009","unstructured":"Garay, J.A., Kolesnikov, V., McLellan, R.: MAC precomputation with applications to secure memory. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 427\u2013442. Springer, Heidelberg (2009)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Cryptology ePrint Archive, Report 2009\/547 (2009), http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1536414.1536440","volume-title":"ACM Symposium on Theory of Computing (STOC 2009)","author":"C. Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM Symposium on Theory of Computing (STOC 2009), pp. 169\u2013178. ACM, New York (2009)"},{"key":"30_CR13","unstructured":"Google App Engine, https:\/\/appengine.google.com"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-85174-5_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"S. Goldwasser","year":"2008","unstructured":"Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 39\u201356. Springer, Heidelberg (2008)"},{"key":"30_CR15","unstructured":"IBM. IBM Cryptocards, http:\/\/www-03.ibm.com\/security\/cryptocards\/"},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Financial Cryptography and Data Security (FC 2010)","author":"K. J\u00e4rvinen","year":"2010","unstructured":"J\u00e4rvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: Financial Cryptography and Data Security (FC 2010), January 25-28. LNCS, Springer, Heidelberg (2010)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC (2001)","DOI":"10.1109\/ACSAC.2001.991542"},{"key":"30_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS 2010) - co-located with Financial Cryptography","author":"S. Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS 2010) - co-located with Financial Cryptography, January 2010, LNCS. Springer, Heidelberg (to appear 2010)"},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-540-70583-3_40","volume-title":"Automata, Languages and Programming","author":"V. Kolesnikov","year":"2008","unstructured":"Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 486\u2013498. Springer, Heidelberg (2008)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. RFC 2104 (Informational) (February 1997), http:\/\/tools.ietf.org\/html\/rfc2104","DOI":"10.17487\/rfc2104"},{"key":"30_CR21","unstructured":"Microsoft SQL Azure, http:\/\/www.microsoft.com\/windowsazure"},{"key":"30_CR22","unstructured":"NIST, U.S. National Institute of Standards and Technology. Federal information processing standards (FIPS 197). Advanced Encryption Standard (AES) (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"30_CR23","unstructured":"NIST, U.S. National Institute of Standards and Technology. Federal information processing standards (FIPS 180-2). Announcing the Secure Hash Standard (August 2002), http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips-180-2.pdf"},{"key":"30_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-10366-7_15","volume-title":"ASIACRYPT 2009","author":"B. Pinkas","year":"2009","unstructured":"Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 250\u2013267. Springer, Heidelberg (2009)"},{"key":"30_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85886-7_1","volume-title":"Information Security","author":"A.-R. Sadeghi","year":"2008","unstructured":"Sadeghi, A.-R., St\u00fcble, C., Winandy, M.: Property-based TPM virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"#cr-split#-30_CR26.1","doi-asserted-by":"crossref","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: PKC 2010. LNCS. Springer, Heidelberg (2010);","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"#cr-split#-30_CR26.2","unstructured":"Cryptology ePrint Archive, Report 2009\/571, http:\/\/eprint.iacr.org"},{"issue":"8","key":"30_CR27","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks\u00a031(8), 831\u2013860 (1999); Special Issue on Computer Network Security","journal-title":"Computer Networks"},{"key":"30_CR28","unstructured":"Song, J.H., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC Algorithm. RFC 4493 (Informational) (June 2006), http:\/\/tools.ietf.org\/html\/rfc4493"},{"key":"30_CR29","unstructured":"Trusted Computing\u00a0Group (TCG). TPM main specification. Main specification, Trusted Computing Group (May 2009), http:\/\/www.trustedcomputinggroup.org"},{"key":"30_CR30","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/SFCS.1986.25","volume-title":"IEEE Symposium on Foundations of Computer Science (FOCS 1986)","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: IEEE Symposium on Foundations of Computer Science (FOCS 1986), pp. 162\u2013167. IEEE, Los Alamitos (1986)"},{"key":"30_CR31","unstructured":"Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149 (May 1994)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T09:25:34Z","timestamp":1740216334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}