|
[1]Sport England: Primary Offer Data Information Pack for Mountaineering, website: http://www.sportengland.org/, Access available 5/31/2011. [2]Chinese Taipei Mountaineering Association, website: http://www.alpineclub.org.tw/tier/front/bin/ptdetail.phtml?Part=tmd-2&Category=100106706, Access available 6/14/2011. [3]M.A.Vouk, “Cloud Computing – Issues, Research and Implementations,” IEEE International Conference on Information technology Interfaces, 2008, pp. 31-40. [4]K. Beaty, A. Kochut and H. Shaikh, “Desktop to Cloud Transformation Planning,” IEEE International Symposium on, Parallel & Distributed Processing, 2009, pp. 1-8. [5]B. Ohlman, A. Eriksson and R. Rembarz, “What Networking of Information Can Do for Cloud Computing,” IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009, pp. 78-83. [6]Sun Microsystems, Inc. “Introduction to Cloud Computing Architecture,” website: http://webobjects.cdw.com/webobjects/media/pdf/Sun_Cloud Computing.pdf, Access available 6/14/2011. [7]H. Li, J. Sedayao, J. Hahn-Steichen, E. Jimison, C. Spence and S. Chahal, “Developing An Enterprise Cloud Computing Strategy,” Intel Corporation, 2009, pp. 1-16. [8]P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, 2009, pp.1-2. [9]I. Muttik and Chris. Barton, “Cloud Security Technologies,” Information Security Technical Report, 2009, pp. 1-6. [10]W. Itani, A. Kayssi, and A. Chehab, Privacy as a Service Privacy-Aware Data Storage and Processing in Cloud Computing Architectures, IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716. [11]K. Hwang, S. Kulkareni, and Y. Hu, “Cloud Security with Virtualized Defense and Reputation-Based Trust Management,” IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 717-722. [12]S. Berger, R. Caceres, K. Goldman, D. Pendarakis, R. Perez, J.R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez “Security for the Cloud Infrastructure-Trusted Virtual Data Center Implementation,” IBM Journal of Research and Development, 2009, Vol. 53, pp. 6:1-6:12. [13]M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signature: Delegation of the Power to Sign Message,” In IEICE Trans. Fundamentals, 1996, Vol. E79-A, No. 9, pp. 1338-1353. [14]B. Lee, H. Kim, and K. Kim, “Strong Proxy Signature and Its Application,” Proceedings of SCIS2001, 2001, pp. 603–608. [15]C.P. Schnorr, “Efficient Signature Generation by Smart Cards,” Journalofcryptology, 1991, Vol. 4, No. 3, pp161–174. [16]B. Lee, H. Kim and K. Kim, “Strong Proxy Signature and Its Applications,” International Conference in Information and Communications Security, Lecture Notes in Computer Science, 2001, pp. 223–232. [17]R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Magazine Communications of the ACM, 1978, Vol. 21. pp. 120–126. [18]T. ElGamal, “A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, 1985, Vol. 31, pp. 469–472. [19]W. Diffie and M.E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, 1976, Vol. 22, pp. 644–654. [20]Internet Engineering Task Force (IETF) Working Group, “Diffie–Hellman Key Agreement Method (RFC 2631), 1999, website: http://www.ietf.org/rfc/rfc2631.txt, Access available 6/14/2011. [21]HTC product, 2011, website: http://www.htc.com/hk-en/product/desirehd/ specification. html, Access available 6/14/2011. [22]M. F. Finneran dBrn Associates, Inc, “WiMax Versus Wi-Fi,”2001, website:http://media.techtarget.com/searchMobileComputing/downloads/Finneran.pdf, Access available 6/14/2011. [23]LAN/MAN Standards Committee of the IEEE computer Society,“802.3ba-2010 IEEE Standard for Information technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Amendment 4: Media Access Control Parameters, Physical Layers and Management Parameters for 40 Gb/s and 100 Gb/s Operation,” 2010, pp. 1-457.
|