Journal of Engineering and Applied Sciences
Year:
2012
Volume:
7
Issue:
8
Page No.
483 - 489
References
BNA, 2009. Privacy and security law report, 8 PVLR 10, 03/09/2009. Copyright 2009 by The Bureau of National Affairs, Inc. (800-372-1033).
Fabre, J.C. and T. Perennou, 1995. Fragmentation of confidential bjects for data processing security in distributed systems. Proceedings of the 5th IEEE Workshop on Future Trends in Distributed Computing Systems, Auguast 28-30, 1995, Sheju Island, Korea -.
Gibbs, M.R., G. Shanks and R. Lederman, 2005. Data quality, Database fragmentation and information privacy. Surveill. Soci., 3: 45-58.
Direct Link | Hose, K. and R. Schenkel, 2010. Distributed database systems-fragmentation and allocation. Cluster of Excellence MMCI,http://www.mpi-inf.mpg.de/departments/d5/teaching/ws10_11/dds/slides/DDS-2-print.pdf.
Sleit, A., W. Al-Mobaideen, S. Al-Areqi and A. Yahya, 2007. A dynamic object fragmentation and replication algorithm in distributed database systems. Am. J. Applied Sci., 4: 613-618.
Direct Link | Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef | Wang, C., Q. Wang and K. Ren, 2009. Ensuring data storage security in cloud computing. Cryptology ePrint Archive, Report. http://eprint.iacr.org/.