메뉴 건너뛰기




Volumn , Issue , 2003, Pages 146-154

Responsive security for stored data

Author keywords

Availability; Byzantine fault tolerance; Confidentiality; Data integrity; Distributed storage service; Replication; Secret sharing; Security

Indexed keywords

AVAILABILITY; COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA PROCESSING; FAULT TOLERANT COMPUTER SYSTEMS; INFORMATION RETRIEVAL SYSTEMS; NETWORK PROTOCOLS; PERFORMANCE; SERVERS;

EID: 0037968842     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 1
    • 0037548801 scopus 로고    scopus 로고
    • The Aware Home Research Initiative
    • The Aware Home Research Initiative, http://www.cc.gatech.edu/fce/ahri/, 2000.
    • (2000)
  • 3
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A., "How to Share a Secret", Communications of the ACM, 22, 1979, pp.612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 6
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • December
    • Schneider F., "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial", ACM Computing Surveys, Vol. 22, No. 4, December 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4
    • Schneider, F.1
  • 8
    • 0037548799 scopus 로고    scopus 로고
    • Scalable and Survivable Data Replication: The Fleet Project
    • Scalable and Survivable Data Replication: The Fleet Project, http://www.bell-labs.com/user/reiter/fleet/.
  • 11
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing and fault tolerance
    • Rabin M., "Efficient dispersal of information for security, load balancing and fault tolerance, Journal of the ACM, 36(2):335-348, 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 15
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Pederson T.P., "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", Proc. Crypto'91, LNCS 576, pp. 129-140.
    • Proc. Crypto'91, LNCS 576 , pp. 129-140
    • Pederson, T.P.1
  • 20
    • 0038562860 scopus 로고    scopus 로고
    • Tolerating malicious gossip
    • Technical Report, Cornell Computer Science TR2001-1853
    • Minsky Y., Schneider F., "Tolerating Malicious Gossip", to appear in Distributed Computing, Technical Report, Cornell Computer Science TR2001-1853.
    • Distributed Computing
    • Minsky, Y.1    Schneider, F.2
  • 24
    • 85028775022 scopus 로고
    • Secret sharing made short
    • D. R. Stinson, ed., Lecture Notes in Computer Science 773
    • Hugo Krawczyk, "Secret sharing made short", in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lecture Notes in Computer Science 773 (1994), 136-146.
    • (1994) Advances in Cryptology - CRYPTO '93 , pp. 136-146
    • Krawczyk, H.1
  • 26
    • 0032162620 scopus 로고    scopus 로고
    • Access control and signatures via quorum secret sharing
    • Moni Naor and Avishai Wool, "Access Control and Signatures via Quorum Secret Sharing", IEEE Trans. Parallel and Distributed Sys 9(9), 1998.
    • (1998) IEEE Trans. Parallel and Distributed Sys , vol.9 , Issue.9
    • Naor, M.1    Wool, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.