메뉴 건너뛰기




Volumn , Issue , 2008, Pages 993-1002

Sharoes: A data sharing platform for outsourced enterprise storage environments

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CHLORINE COMPOUNDS; COST EFFECTIVENESS; CRYPTOGRAPHY; INFORMATION THEORY; METADATA; SECURITY SYSTEMS; TECHNOLOGY;

EID: 52649147450     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2008.4497508     Document Type: Conference Paper
Times cited : (34)

References (26)
  • 1
    • 52649090574 scopus 로고    scopus 로고
    • Gartner Group., http://www.gartner.com.
  • 2
    • 52649171771 scopus 로고    scopus 로고
    • Are you ready to outsource your storage?
    • June
    • F. Brick, "Are you ready to outsource your storage?" Computer Technology Review, June 2003.
    • (2003) Computer Technology Review
    • Brick, F.1
  • 3
    • 52649136920 scopus 로고    scopus 로고
    • Amazon Storage Service., http://aws.amazon.com/s3.
    • Amazon Storage Service., http://aws.amazon.com/s3.
  • 4
    • 52649124663 scopus 로고    scopus 로고
    • SUN Grid., http://www.sun.com/service/sungria/index.isp.
  • 5
    • 33244458709 scopus 로고    scopus 로고
    • The evolution of storage service providers: Techniques and challenges to outsourcing storage
    • R. Hasan, W. Yurcik, and S. Myagmar, "The evolution of storage service providers: techniques and challenges to outsourcing storage," in StorageSS, 2005, pp. 1-8.
    • (2005) StorageSS , pp. 1-8
    • Hasan, R.1    Yurcik, W.2    Myagmar, S.3
  • 6
    • 52649151670 scopus 로고    scopus 로고
    • Secure Management of Networked Storage Services: Models & Techniques,
    • PhD Thesis, Georgia Tech
    • A. Singh, "Secure Management of Networked Storage Services: Models & Techniques," PhD Thesis, Georgia Tech http://www.aameeksingh.com/ thesis.pdf, 2007.
    • (2007)
    • Singh, A.1
  • 7
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • M. Kallahalla, E. Riedel, and et al, "Plutus: Scalable secure file sharing on untrusted storage," in FAST, 2003.
    • (2003) FAST
    • Kallahalla, M.1    Riedel, E.2    and et, al.3
  • 9
    • 4644274612 scopus 로고    scopus 로고
    • Strong Security for Distributed File Systems
    • E. Miller, D. Long, W. Freeman, and B. Reed, "Strong Security for Distributed File Systems," in FAST, 2002.
    • (2002) FAST
    • Miller, E.1    Long, D.2    Freeman, W.3    Reed, B.4
  • 10
    • 0242625197 scopus 로고    scopus 로고
    • Cryptographic access control in a distributed file system
    • A. Harrington and C. Jensen, "Cryptographic access control in a distributed file system," in SACMAT, 2003.
    • (2003) SACMAT
    • Harrington, A.1    Jensen, C.2
  • 11
    • 19944427193 scopus 로고    scopus 로고
    • FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
    • A. Adya, W. Bolosky, and et al, 'FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," in OSDI, 2002.
    • (2002) OSDI
    • Adya, A.1    Bolosky, W.2    and et, al.3
  • 12
    • 33244493597 scopus 로고    scopus 로고
    • Toward securing untrusted storage without public-key operations
    • D. Naor, A. Shenhav, and A. Wool, "Toward securing untrusted storage without public-key operations," in StorageSS, 2005.
    • (2005) StorageSS
    • Naor, D.1    Shenhav, A.2    Wool, A.3
  • 13
    • 52649164463 scopus 로고    scopus 로고
    • Privacy analysis for data sharing in *nix systems
    • A. Singh, L. Liu, and M. Ahamad, "Privacy analysis for data sharing in *nix systems," in USENDC Annual, 2006.
    • (2006) USENDC Annual
    • Singh, A.1    Liu, L.2    Ahamad, M.3
  • 14
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM Journal of Computing, vol. 32, no. 3, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3
    • Boneh, D.1    Franklin, M.2
  • 15
    • 52649179751 scopus 로고    scopus 로고
    • Unlocking value from text-based information
    • Bulter Group
    • Bulter Group, "Unlocking value from text-based information," Review Journal Article, 2003.
    • (2003) Review Journal Article
  • 18
    • 77952379905 scopus 로고    scopus 로고
    • Secure untrusted data repository SUNDR
    • J. Li, M. Krohn, and D. Mazieres, "Secure untrusted data repository SUNDR," in OSDI, 2004.
    • (2004) OSDI
    • Li, J.1    Krohn, M.2    Mazieres, D.3
  • 22
    • 52649098834 scopus 로고    scopus 로고
    • Cryptographic Algorithms and Key Sizes for Personal Identity Verification
    • NIST
    • NIST, "Cryptographic Algorithms and Key Sizes for Personal Identity Verification," NIST Special Publication 800-78, 2005.
    • (2005) NIST Special Publication , vol.800 -78
  • 25
    • 84949023663 scopus 로고
    • Secret-key agreement without public-key
    • T Leighton and S. Micali, "Secret-key agreement without public-key," in CRYPTO, 1994, pp. 456-479.
    • (1994) CRYPTO , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 26
    • 0000893265 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom, "An optimal class of symmetric key generation systems," in EUROCRYPT, 1985.
    • (1985) EUROCRYPT
    • Blom, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.