-
1
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. Farsite: federated, available, and reliable storage for an incompletely trusted environment. SIGOPS Oper. Syst. Rev., 36(SI):1-14, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev
, vol.36
, Issue.SI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
2
-
-
18044404941
-
Minerva: An automated resource provisioning tool for large-scale storage systems
-
G. Alvarez, E. Borowsky, S. Go, T. Romer, R. Becker-szendy, R. Golding, A. Merchant, M. Spasojevic, A. Veitch, and J. Wilkes. Minerva: an automated resource provisioning tool for large-scale storage systems. ACM Transactions on Computer Systems, 19:483-518, 2001.
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, pp. 483-518
-
-
Alvarez, G.1
Borowsky, E.2
Go, S.3
Romer, T.4
Becker-szendy, R.5
Golding, R.6
Merchant, A.7
Spasojevic, M.8
Veitch, A.9
Wilkes, J.10
-
3
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12(3):1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
5
-
-
18744363342
-
-
T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference, pages 396-401, 2004
-
T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference, pages 396-401, 2004.
-
-
-
-
6
-
-
0141972441
-
New hierarchical assignment without public key cryptography
-
H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 523-526
-
-
Chien, H.1
Jan, J.2
-
9
-
-
36248981396
-
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing, IFIP International Federation for Information Processing, 232, New Approaches for Security, Privacy and Trust in Complex Environments, pages 385-396. Springer, 2007.
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing, IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, pages 385-396. Springer, 2007.
-
-
-
-
10
-
-
33244469997
-
Key management for multi-user encrypted databases
-
E. Damiani, S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multi-user encrypted databases. In Proceedings of the ACM workshop on Storage security and survivability, pages 74-83, 2005.
-
(2005)
Proceedings of the ACM workshop on Storage security and survivability
, pp. 74-83
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. A data outsourcing architecture combining cryptography and access control. In Proceedings of the ACM workshop on Computer security architecture, pages 63-69, 2007.
-
(2007)
Proceedings of the ACM workshop on Computer security architecture
, pp. 63-69
-
-
di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: management of access control evolution on outsourced data. In Proceedings of the international conference on Very large data bases, pages 123-134, 2007.
-
(2007)
Proceedings of the international conference on Very large data bases
, pp. 123-134
-
-
di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium, pages 131-145, 2003.
-
(2003)
Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
15
-
-
56649103630
-
Athos: Efficient authentication of outsourced le systems
-
M. T. Goodrich, C. Papamanthou, R. Tamassia, and N. Triandopoulos. Athos: Efficient authentication of outsourced le systems. In Proceedings of the international conference on Information Security, pages 80-96, 2008.
-
(2008)
Proceedings of the international conference on Information Security
, pp. 80-96
-
-
Goodrich, M.T.1
Papamanthou, C.2
Tamassia, R.3
Triandopoulos, N.4
-
17
-
-
85033460636
-
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies, pages 29-42, 2003.
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies, pages 29-42, 2003.
-
-
-
-
19
-
-
77952379905
-
Secure untrusted data repository (sundr)
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (sundr). In Proceedings of the conference on Symposium on Opearting Systems Design & Implementation, pages 121-136, 2004.
-
(2004)
Proceedings of the conference on Symposium on Opearting Systems Design & Implementation
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
20
-
-
29644447800
-
A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map
-
P. Li, Z. Li, W. A. Halang, and G. Chen. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Physics Letters A, 349(6):467-473, 2006.
-
(2006)
Physics Letters A
, vol.349
, Issue.6
, pp. 467-473
-
-
Li, P.1
Li, Z.2
Halang, W.A.3
Chen, G.4
-
21
-
-
0035149664
-
Hierarchical key assignment without public-key cryptography
-
C. Lin. Hierarchical key assignment without public-key cryptography. Computers & Security, 20(7):612-619, 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.7
, pp. 612-619
-
-
Lin, C.1
-
22
-
-
0037266458
-
An efficient implementation of a drug candidate database
-
Z. Miled, Y. Liu, D. Powers, O. Bukhres, M. Bem, R. Jones, and R. Oppelt. An efficient implementation of a drug candidate database. J. Chem. Inf. Comput. Sci., 43(1):25-35, 2003.
-
(2003)
J. Chem. Inf. Comput. Sci
, vol.43
, Issue.1
, pp. 25-35
-
-
Miled, Z.1
Liu, Y.2
Powers, D.3
Bukhres, O.4
Bem, M.5
Jones, R.6
Oppelt, R.7
-
23
-
-
0034997394
-
Strong security for distributed file systems
-
E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In IEEE International Conference on Performance, Computing, and Communications, pages 34-40, 2001.
-
(2001)
IEEE International Conference on Performance, Computing, and Communications
, pp. 34-40
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
24
-
-
74049144642
-
-
php
-
OpenCrowd. Opencrowd cloud taxonomy. http://www.opencrowd.com/views/ cloud.php, 2009.
-
(2009)
Opencrowd cloud taxonomy
-
-
-
25
-
-
74049134521
-
-
B. Preneel, et, and al. Performance of optimized implementations of the nessie primitives. Deliverable 21 from the NESSIE IST FP5 project, 2003.
-
B. Preneel, et, and al. Performance of optimized implementations of the nessie primitives. Deliverable 21 from the NESSIE IST FP5 project, 2003.
-
-
-
-
26
-
-
74049126248
-
-
P. J. Rhodes. Granite: a scientific database model and implementation. PhD thesis, University of New Hampshire, 2004. Adviser-Bergeron, R. Daniel and Adviser-Sparr, Ted M.
-
P. J. Rhodes. Granite: a scientific database model and implementation. PhD thesis, University of New Hampshire, 2004. Adviser-Bergeron, R. Daniel and Adviser-Sparr, Ted M.
-
-
-
-
27
-
-
34250681409
-
Data grid deployment for high energy physics in japan
-
July
-
H. Sakamoto. Data grid deployment for high energy physics in japan. Computer Physics Communications, 177(1-2):239-242, July 2007.
-
(2007)
Computer Physics Communications
, vol.177
, Issue.1-2
, pp. 239-242
-
-
Sakamoto, H.1
-
31
-
-
84997556980
-
Integrity auditing of outsourced data
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proceedings of the international conference on Very large data bases, pages 782-793, 2007.
-
(2007)
Proceedings of the international conference on Very large data bases
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
32
-
-
0036920852
-
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 200
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 200
-
-
-
|