-
3
-
-
82655166471
-
A five-year study of file-system metadata
-
USENIX Association.
-
N. Agrawal, W. J. Bolosky, J. R. Douceur, and J. R. Lorch. A five-year study of file-system metadata. In Proceedings of the 5th USENIX conference on File and Storage Technologies (FAST 07), Berkeley, CA, USA, 2007. USENIX Association.
-
Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST 07), Berkeley, CA, USA, 2007
-
-
Agrawal, N.1
Bolosky, W.J.2
Douceur, J.R.3
Lorch, J.R.4
-
4
-
-
37849008829
-
Provably-secure schemes for basic query support in outsourced databases
-
S. Barker and G.-J. Ahn, editors, DBSec, Springer
-
G. Amanatidis, A. Boldyreva, and A. O'Neill. Provably-secure schemes for basic query support in outsourced databases. In S. Barker and G.-J. Ahn, editors, DBSec, volume 4602 of Lecture Notes in Computer Science, pages 14-30. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4602
, pp. 14-30
-
-
Amanatidis, G.1
Boldyreva, A.2
O'Neill, A.3
-
6
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
A. Menezes, editor, CRYPTO, Springer
-
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In A. Menezes, editor, CRYPTO, volume 4622 of Lecture Notes in Computer Science, pages 535-552. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
9
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.
-
(2003)
EuroCrypt
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
4444361800
-
The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX
-
Boston, MA, June
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, and P. Persiano. The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX. In Proceedings of the Annual USENIX Technical Conference, FREENIX Track, pages 245-252, Boston, MA, June 2001.
-
(2001)
Proceedings of the Annual USENIX Technical Conference, FREENIX Track
, pp. 245-252
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
14
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
New York, NY, USA, ACM.
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 79-88, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
15
-
-
77958484856
-
Authentic third-party data publication
-
P. T. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security, pages 101-112, 2000.
-
(2000)
IFIP Workshop on Database Security
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
18
-
-
21644437974
-
The Google File System
-
Bolton Landing, NY, October ACM SIGOPS
-
S. Ghemawat, H. Gobioff, and S. T. Leung. The Google File System. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03), pages 29-43, Bolton Landing, NY, October 2003. ACM SIGOPS.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03)
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.T.3
-
19
-
-
77957936026
-
-
Google Inc Online at
-
Google Inc. Google App Engine. Online at http://code.google.com/ appengine/.
-
Google App Engine
-
-
-
20
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM Press
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 216-227. ACM Press, 2002.
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
23
-
-
33244477298
-
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
-
Atlanta, GA, November USENIX Association
-
A. Kashyap, S. Patil, G. Sivathanu, and E. Zadok. I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004), pages 69-79, Atlanta, GA, November 2004. USENIX Association.
-
(2004)
Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004)
, pp. 69-79
-
-
Kashyap, A.1
Patil, S.2
Sivathanu, G.3
Zadok, E.4
-
27
-
-
0038223814
-
-
Technical report
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authenticated data structures. Technical report, 2001.
-
(2001)
A General Model for Authenticated Data Structures
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
28
-
-
21044438930
-
A general model for authenticated data structures
-
DOI 10.1007/s00453-003-1076-8
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine. A general model for authenticated data structures. Algorithmica, 39(1):21-41, 2004. (Pubitemid 40871671)
-
(2004)
Algorithmica (New York)
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
31
-
-
78650206764
-
-
Technical report, Microsoft Corporation, July
-
Microsoft Research. Encrypting File System for Windows 2000. Technical report, Microsoft Corporation, July 1999. www.microsoft.com/windows2000/ techinfo/ howitworks/security/encrypt.asp.
-
(1999)
Microsoft Research. Encrypting File System for Windows 2000
-
-
-
33
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Computer Security - ESORICS 2004, Springer
-
E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In Computer Security - ESORICS 2004, volume 3193 of Lecture Notes in Computer Science, pages 160-176. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
34
-
-
34548160016
-
Authentication of Outsourced Databases using Signature Aggregation and Chaining
-
M. Narasimha and G. Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.
-
Proceedings of DASFAA, 2006
-
-
Narasimha, M.1
Tsudik, G.2
-
35
-
-
78650192086
-
-
Online at
-
Optimum. Optimum online plans. Online at http://www.buyoptimum.com.
-
Optimum Online Plans
-
-
-
37
-
-
2442590644
-
Authenticating query results in edge computing
-
Washington, DC, USA, IEEE Computer Society
-
H. Pang and K.-L. Tan. Authenticating query results in edge computing. In ICDE '04: Proceedings of the 20th International Conference on Data Engineering, page 560, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
ICDE '04: Proceedings of the 20th International Conference on Data Engineering
, pp. 560
-
-
Pang, H.1
Tan, K.-L.2
-
38
-
-
33244473885
-
-
Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May
-
G. Sivathanu, C. P. Wright, and E. Zadok. Enhancing File System Integrity Through Checksums. Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May 2004. www.fsl.cs. sunysb.edu/docs/nc-checksum-tr/nc- checksum.pdf.
-
(2004)
Enhancing File System Integrity Through Checksums
-
-
Sivathanu, G.1
Wright, C.P.2
Zadok, E.3
|