![]() |
Volumn , Issue , 2010, Pages 251-258
|
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
c
IBM
(United States)
|
Author keywords
Cloud computing; Data integrity; Non repudiation; Storage security
|
Indexed keywords
BUSINESS MODELS;
CLOUD COMPUTING;
CLOUD DATA;
CLOUD STORAGES;
DATA INTEGRITY;
DATA SECURITY;
DATA STORAGE;
DATA STORAGE TECHNOLOGY;
DISTRIBUTED STORAGE;
NETWORK ENVIRONMENTS;
NETWORK INFRASTRUCTURE;
NETWORK-BASED;
NON-REPUDIATION;
NON-REPUDIATION PROTOCOL;
PAY-AS-YOU-GO;
SERVICE PROVIDER;
STORAGE SECURITY;
DATA STORAGE EQUIPMENT;
INFORMATION MANAGEMENT;
NETWORK MANAGEMENT;
NETWORK PROTOCOLS;
NETWORK SECURITY;
DISTRIBUTED COMPUTER SYSTEMS;
|
EID: 78649885971
PISSN: 15302016
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICPPW.2010.42 Document Type: Conference Paper |
Times cited : (36)
|
References (15)
|