-
1
-
-
52649090574
-
-
Gartner Group., http://www.gartner.com.
-
-
-
-
2
-
-
52649171771
-
Are you ready to outsource your storage?
-
June
-
F. Brick, "Are you ready to outsource your storage?" Computer Technology Review, June 2003.
-
(2003)
Computer Technology Review
-
-
Brick, F.1
-
3
-
-
52649136920
-
-
Amazon Storage Service., http://aws.amazon.com/s3.
-
Amazon Storage Service., http://aws.amazon.com/s3.
-
-
-
-
4
-
-
52649124663
-
-
SUN Grid., http://www.sun.com/service/sungria/index.isp.
-
-
-
-
5
-
-
33244458709
-
The evolution of storage service providers: Techniques and challenges to outsourcing storage
-
R. Hasan, W. Yurcik, and S. Myagmar, "The evolution of storage service providers: techniques and challenges to outsourcing storage," in StorageSS, 2005, pp. 1-8.
-
(2005)
StorageSS
, pp. 1-8
-
-
Hasan, R.1
Yurcik, W.2
Myagmar, S.3
-
6
-
-
52649151670
-
Secure Management of Networked Storage Services: Models & Techniques,
-
PhD Thesis, Georgia Tech
-
A. Singh, "Secure Management of Networked Storage Services: Models & Techniques," PhD Thesis, Georgia Tech http://www.aameeksingh.com/ thesis.pdf, 2007.
-
(2007)
-
-
Singh, A.1
-
7
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, and et al, "Plutus: Scalable secure file sharing on untrusted storage," in FAST, 2003.
-
(2003)
FAST
-
-
Kallahalla, M.1
Riedel, E.2
and et, al.3
-
8
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: securing remote untrusted storage," in NDSS, 2003.
-
(2003)
NDSS
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
9
-
-
4644274612
-
Strong Security for Distributed File Systems
-
E. Miller, D. Long, W. Freeman, and B. Reed, "Strong Security for Distributed File Systems," in FAST, 2002.
-
(2002)
FAST
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
10
-
-
0242625197
-
Cryptographic access control in a distributed file system
-
A. Harrington and C. Jensen, "Cryptographic access control in a distributed file system," in SACMAT, 2003.
-
(2003)
SACMAT
-
-
Harrington, A.1
Jensen, C.2
-
11
-
-
19944427193
-
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
-
A. Adya, W. Bolosky, and et al, 'FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," in OSDI, 2002.
-
(2002)
OSDI
-
-
Adya, A.1
Bolosky, W.2
and et, al.3
-
12
-
-
33244493597
-
Toward securing untrusted storage without public-key operations
-
D. Naor, A. Shenhav, and A. Wool, "Toward securing untrusted storage without public-key operations," in StorageSS, 2005.
-
(2005)
StorageSS
-
-
Naor, D.1
Shenhav, A.2
Wool, A.3
-
13
-
-
52649164463
-
Privacy analysis for data sharing in *nix systems
-
A. Singh, L. Liu, and M. Ahamad, "Privacy analysis for data sharing in *nix systems," in USENDC Annual, 2006.
-
(2006)
USENDC Annual
-
-
Singh, A.1
Liu, L.2
Ahamad, M.3
-
14
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM Journal of Computing, vol. 32, no. 3, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
52649179751
-
Unlocking value from text-based information
-
Bulter Group
-
Bulter Group, "Unlocking value from text-based information," Review Journal Article, 2003.
-
(2003)
Review Journal Article
-
-
-
18
-
-
77952379905
-
Secure untrusted data repository SUNDR
-
J. Li, M. Krohn, and D. Mazieres, "Secure untrusted data repository SUNDR," in OSDI, 2004.
-
(2004)
OSDI
-
-
Li, J.1
Krohn, M.2
Mazieres, D.3
-
22
-
-
52649098834
-
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
-
NIST
-
NIST, "Cryptographic Algorithms and Key Sizes for Personal Identity Verification," NIST Special Publication 800-78, 2005.
-
(2005)
NIST Special Publication
, vol.800 -78
-
-
-
24
-
-
0023964787
-
Scale and Performance in a Distributed File System
-
J. H. Howard, M. L. Kazar, and et al, "Scale and Performance in a Distributed File System," ACM Transactions on Computer Systems, vol. 6, no. 1, pp. 51-81, 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J.H.1
Kazar, M.L.2
and et, al.3
-
25
-
-
84949023663
-
Secret-key agreement without public-key
-
T Leighton and S. Micali, "Secret-key agreement without public-key," in CRYPTO, 1994, pp. 456-479.
-
(1994)
CRYPTO
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
26
-
-
0000893265
-
An optimal class of symmetric key generation systems
-
R. Blom, "An optimal class of symmetric key generation systems," in EUROCRYPT, 1985.
-
(1985)
EUROCRYPT
-
-
Blom, R.1
|