-
1
-
-
70349239883
-
-
Amazon S3 simple storage service
-
Amazon S3 (simple storage service). http://aws.amazon.com/s3.
-
-
-
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. ACM Conf. on Computer and Communications Security, pp. 598-609, 2007.
-
(2007)
Proc. ACM Conf. on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
27844601582
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. Stubblebine. Flexible authentication of XML documents. Journal of Computer Security, 6:841-864, 2004.
-
(2004)
Journal of Computer Security
, vol.6
, pp. 841-864
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.6
-
6
-
-
0346739133
-
Fast and secure distributed read-only file system
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM Trans. on Computer Systems, 20(1):1-24, 2002.
-
(2002)
ACM Trans. on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
7
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proc. Network and Distributed System Security, pp. 131-145, 2003.
-
(2003)
Proc. Network and Distributed System Security
, pp. 131-145
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
8
-
-
21144440101
-
Authenticated dictionaries for fresh attribute credentials
-
M. T. Goodrich, M. Shin, R. Tamassia, and W. H. Winsborough. Authenticated dictionaries for fresh attribute credentials. In Proc. Trust Management Conference, pp. 332-347, 2003.
-
(2003)
Proc. Trust Management Conference
, pp. 332-347
-
-
Goodrich, M.T.1
Shin, M.2
Tamassia, R.3
Winsborough, W.H.4
-
9
-
-
56649103630
-
Athos: Efficient Authentication of Outsourced File Systems
-
M. T. Goodrich, C. Papamanthou, R. Tamassia, and N. Triandopoulos. Athos: Efficient Authentication of Outsourced File Systems. In Proc. Information Security Conference, pp. 80-96, 2008.
-
(2008)
Proc. Information Security Conference
, pp. 80-96
-
-
Goodrich, M.T.1
Papamanthou, C.2
Tamassia, R.3
Triandopoulos, N.4
-
11
-
-
37849010966
-
-
R. C. Jammalamadaka, R. Gamboni, S. Mehrotra, K. E. Seamons, and N. Venkatasubramanian. gVault: A gmail based cryptographic network file system. In Proc. Working Conference on Data and Applications Security, pp. 161-176, 2007.
-
R. C. Jammalamadaka, R. Gamboni, S. Mehrotra, K. E. Seamons, and N. Venkatasubramanian. gVault: A gmail based cryptographic network file system. In Proc. Working Conference on Data and Applications Security, pp. 161-176, 2007.
-
-
-
-
14
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proc. ACM SIGMOD International Conf. on Management of Data, pp. 121-132, 2006.
-
(2006)
Proc. ACM SIGMOD International Conf. on Management of Data
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
15
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. Operating Systems Design and Implementation, pp. 121-136, 2004.
-
(2004)
Proc. Operating Systems Design and Implementation
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Mazières, D.3
Shasha, D.4
-
21
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. ACM Trans. on Storage, 2(2):107-138, 2006.
-
(2006)
ACM Trans. on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
23
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
A. Oprea and M. K. Reiter. Integrity checking in cryptographic file systems with constant trusted storage. In Proc. USENIX Security Symposium, pp. 183-198, 2007.
-
(2007)
Proc. USENIX Security Symposium
, pp. 183-198
-
-
Oprea, A.1
Reiter, M.K.2
-
25
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Commun. ACM, 33(6):668-676, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
27
-
-
70349234988
-
-
H. Shacham and B. Waters. Compact proofs of retrievability. Crypto. ePrint Arch., 08/073, 2008.
-
H. Shacham and B. Waters. Compact proofs of retrievability. Crypto. ePrint Arch., 08/073, 2008.
-
-
-
|