Related references
Note: Only part of the references are listed.A survey of accountability in computer networks and distributed systems
Zhifeng Xiao et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
GlobalView: building global view with log files in a distributed/networked system for accountability
Yang Xiao et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
Cyber Security and Privacy Issues in Smart Grids
Jing Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)
Accountability using flow-net: design, implementation, and performance evaluation
Yang Xiao et al.
SECURITY AND COMMUNICATION NETWORKS (2012)
Understanding Cloud Computing Vulnerabilities
Bernd Grobauer et al.
IEEE SECURITY & PRIVACY (2011)
A survey on security issues in service delivery models of cloud computing
S. Subashini et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Temporal Accountability and Anonymity in Medical Sensor Networks
Jing Liu et al.
MOBILE NETWORKS & APPLICATIONS (2011)
HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
Yinqian Zhang et al.
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)
Flow-Net Methodology for Accountability in Wireless Networks
Yang Xiao
IEEE NETWORK (2009)
A survey of anonymity in wireless communication systems
Hui Chen et al.
SECURITY AND COMMUNICATION NETWORKS (2009)
Mapreduce: Simplified data processing on large clusters
Jeffrey Dean et al.
COMMUNICATIONS OF THE ACM (2008)
Non deterministic caches: a simple and effective defense against side channel attacks
G. Keramidas et al.
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS (2008)
Lurking in the shadows: Identifying systemic threats to kernel data (Short paper)
Arati Baliga et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)
Security and privacy in RFID and applications in telemedicine
Y Xiao et al.
IEEE COMMUNICATIONS MAGAZINE (2006)