-
2
-
-
68249129760
-
-
University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
77953318836
-
-
Online at June
-
S. Wilson, "Appengine outage," Online at http://www.cio-weblog. com/50226711/appengine outage.php, June 2008.
-
(2008)
Appengine Outage
-
-
Wilson, S.1
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
Report 2007/202
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," Cryptology ePrint Archive, Report 2007/202, 2007, http://eprint.iacr.org/.
-
Cryptology EPrint Archive
, pp. 2007
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
7
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
Report 2008/186
-
M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008, http://eprint.iacr.org/.
-
Cryptology EPrint Archive
, pp. 2008
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
8
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. of ESORICS'09, Saint Malo, France, Sep. 2009.
-
Proc. of ESORICS'09, Saint Malo, France, Sep. 2009
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
58349118819
-
Compact proofs of retrievability
-
Dec
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90-107.
-
(2008)
Proc. of Asiacrypt 2008
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
11
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Alexandria, VA, October
-
A. Juels and J. Burton S. Kaliski, "Pors: Proofs of retrievability for large files," in Proc. of CCS'07, Alexandria, VA, October 2007, pp. 584-597.
-
(2007)
Proc. of CCS'07
, pp. 584-597
-
-
Juels, A.1
Burton, J.2
Kaliski, S.3
-
12
-
-
85016272824
-
Auditing to keep online storage services honest
-
Berkeley, CA, USA: USENIX Association
-
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to keep online storage services honest," in Proc. of HotOS'07. Berkeley, CA, USA: USENIX Association, 2007, pp. 1-6.
-
(2007)
Proc. of HotOS'07
, pp. 1-6
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
13
-
-
77953306928
-
-
104th United States Congress, Online at 1996, last access: July 16, 2009
-
104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPPA)," Online at http://aspe.hhs.gov/ admnsimp/pl104191.htm, 1996, last access: July 16, 2009.
-
Health Insurance Portability and Accountability Act of 1996 (HIPPA)
-
-
-
14
-
-
77953310709
-
Achieving secure, scalable, and fine-grained access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained access control in cloud computing," in Proc. of IEEE INFOCOM'10, San Diego, CA, USA, March 2010.
-
Proc. of IEEE INFOCOM'10, San Diego, CA, USA, March 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
15
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proceedings of Eurocrypt 2003, Springer-Verlag
-
D. Boneh and C. Gentry, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proceedings of Eurocrypt 2003, volume 2656 of LNCS. Springer-Verlag, 2003, pp. 416-432.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
-
16
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Report 2009/579
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," Cryptology ePrint Archive, Report 2009/579, 2009, http://eprint.iacr.org/.
-
(2009)
Cryptology EPrint Archive
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
17
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Proceedings of Eurocrypt 1998, Springer-Verlag
-
M. Bellare, J. Garay, and T. Rabin, "Fast batch verification for modular exponentiation and digital signatures," in Proceedings of Eurocrypt 1998, volume 1403 of LNCS. Springer-Verlag, 1998, pp. 236-250.
-
(1998)
LNCS
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
18
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Proceedings of Eurocrypt 1989, Springer-Verlag
-
C. Schnorr, "Efficient identification and signatures for smart cards," in Proceedings of Eurocrypt 1989, volume 435 of LNCS. Springer-Verlag, 1989, pp. 239-252.
-
(1989)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.1
-
19
-
-
84927727752
-
Security proofs for signature schemes
-
Proceedings of Eurocrypt 1996, Springer-Verlag
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," in Proceedings of Eurocrypt 1996, volume 1070 of LNCS. Springer-Verlag, 1996, pp. 387-398.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
20
-
-
67650224819
-
Practical short signature batch verification
-
Proceedings of CT-RSA, Springer-Verlag
-
A. L. Ferrara, M. Greeny, S. Hohenberger, and M. Pedersen, "Practical short signature batch verification," in Proceedings of CT-RSA, volume 5473 of LNCS. Springer-Verlag, 2009, pp. 309-324.
-
(2009)
LNCS
, vol.5473
, pp. 309-324
-
-
Ferrara, A.L.1
Greeny, M.2
Hohenberger, S.3
Pedersen, M.4
-
21
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. of SecureComm'08, 2008.
-
Proc. of SecureComm'08, 2008
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
22
-
-
70449569012
-
Ensuring Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009.
-
Proc. of IWQoS'09, July 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
23
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. of CCS'09, 2009.
-
Proc. of CCS'09, 2009
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
|