-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. 14th ACM Conference on Computer and Communications Security (CCS), pages 598-609, 2007.
-
(2007)
Proc. 14th ACM Conference on Computer and Communications Security (CCS)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
0028482823
-
Checking the correctness of memories
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12:225-244, 1994.
-
(1994)
Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
4
-
-
68849092044
-
Integrity protection for revision control
-
M. Abdalla and D. Pointcheval, editors
-
C. Cachin and M. Geisler. Integrity protection for revision control. In M. Abdalla and D. Pointcheval, editors, Proc. Applied Cryptography and Network Security (ACNS), volume 5536 of Lecture Notes in Computer Science, pages 382-399, 2009.
-
(2009)
Proc. Applied Cryptography and Network Security (ACNS), Volume 5536 of Lecture Notes in Computer Science
, pp. 382-399
-
-
Cachin, C.1
Geisler, M.2
-
6
-
-
59349094939
-
Fork sequential consistency is blocking
-
C. Cachin, I. Keidar, and A. Shraer. Fork sequential consistency is blocking. Inf. Process. Lett., 109(7):360-364, 2009.
-
(2009)
Inf. Process. Lett.
, vol.109
, Issue.7
, pp. 360-364
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
8
-
-
59249102694
-
Attested append-only memory: Making adversaries stick to their word
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: Making adversaries stick to their word. In Proc. 21st ACM Symposium on Operating System Principles (SOSP), pages 189-204, 2007.
-
(2007)
Proc. 21st ACM Symposium on Operating System Principles (SOSP)
, pp. 189-204
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
10
-
-
56649103630
-
Athos: Efficient authentication of outsourced file systems
-
T.-C. Wu et al., editors
-
M. T. Goodrich, C. Papamanthou, R. Tamassia, and N. Triandopoulos. Athos: Efficient authentication of outsourced file systems. In T.-C. Wu et al., editors, Proc. 11th Information Security Conference (ISC), volume 5222 of Lecture Notes in Computer Science, pages 80-96, 2008.
-
(2008)
Proc. 11th Information Security Conference (ISC), Volume 5222 of Lecture Notes in Computer Science
, pp. 80-96
-
-
Goodrich, M.T.1
Papamanthou, C.2
Tamassia, R.3
Triandopoulos, N.4
-
11
-
-
68149102542
-
Efficient integrity checking of untrusted network storage
-
A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia. Efficient integrity checking of untrusted network storage. In Proc. Workshop on Storage Security and Survivability (StorageSS), pages 43-54, 2008.
-
(2008)
Proc. Workshop on Storage Security and Survivability (StorageSS)
, pp. 43-54
-
-
Heitzmann, A.1
Palazzi, B.2
Papamanthou, C.3
Tamassia, R.4
-
12
-
-
70449824785
-
Low-overhead byzantine fault-tolerant storage
-
J. Hendricks, G. R. Ganger, and M. K. Reiter. Low-overhead Byzantine fault-tolerant storage. In SOSP, pages 73-86, 2007.
-
(2007)
SOSP
, pp. 73-86
-
-
Hendricks, J.1
Ganger, G.R.2
Reiter, M.K.3
-
15
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. 2nd USENIX Conference on File and Storage Technologies (FAST), 2003.
-
(2003)
Proc. 2nd USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
16
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558-565, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
17
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. 6th Symp. Operating Systems Design and Implementation (OSDI), pages 121-136, 2004.
-
(2004)
Proc. 6th Symp. Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
19
-
-
72749095250
-
Abortable fork-linearizable storage
-
T. F. Abdelzaher, M. Raynal, and N. Santoro, editors
-
M. Majuntke, D. Dobre, M. Serafini, and N. Suri. Abortable fork-linearizable storage. In T. F. Abdelzaher, M. Raynal, and N. Santoro, editors, Proc. 13th Conference on Principles of Distributed Systems (OPODIS), volume 5923 of Lecture Notes in Computer Science, pages 255-269, 2009.
-
(2009)
Proc. 13th Conference on Principles of Distributed Systems (OPODIS), Volume 5923 of Lecture Notes in Computer Science
, pp. 255-269
-
-
Majuntke, M.1
Dobre, D.2
Serafini, M.3
Suri, N.4
-
22
-
-
77956249645
-
Eventually linearizable shared objects
-
M. Serafini, D. Dobre, M. Majuntke, P. Bokor, and N. Suri. Eventually linearizable shared objects. In Proc. 29th ACM Symposium on Principles of Distributed Computing (PODC), pages 95-104, 2010.
-
(2010)
Proc. 29th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 95-104
-
-
Serafini, M.1
Dobre, D.2
Majuntke, M.3
Bokor, P.4
Suri, N.5
-
23
-
-
33845192207
-
Managing update conflicts in bayou, a weakly connected replicated storage system
-
D. B. Terry, M. Theimer, K. Petersen, A. J. Demers, M. Spreitzer, and C. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proc. 15th ACM Symposium on Operating System Principles (SOSP), pages 172-182, 1995.
-
(1995)
Proc. 15th ACM Symposium on Operating System Principles (SOSP)
, pp. 172-182
-
-
Terry, D.B.1
Theimer, M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.5
Hauser, C.6
-
25
-
-
57349117592
-
Lock-free consistency control for web 2.0 applications
-
J. Yang, H. Wang, N. Gu, Y. Liu, C. Wang, and Q. Zhang. Lock-free consistency control for Web 2.0 applications. In Proc. 17th Intl. Conference on World Wide Web (WWW), pages 725-734, 2008.
-
(2008)
Proc. 17th Intl. Conference on World Wide Web (WWW)
, pp. 725-734
-
-
Yang, J.1
Wang, H.2
Gu, N.3
Liu, Y.4
Wang, C.5
Zhang, Q.6
|