-
1
-
-
0028482823
-
Checking the correctness of memories
-
Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. Algorithmica 12, 225-244 (1994)
-
(1994)
Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
2
-
-
68849092044
-
Integrity protection for revision control
-
Abdalla, M., Pointcheval, D. (eds.), ACNS 2009, Springer, Heidelberg
-
Cachin, C., Geisler, M.: Integrity protection for revision control. In: Abdalla, M., Pointcheval, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 382-399. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 382-399
-
-
Cachin, C.1
Geisler, M.2
-
3
-
-
70449984096
-
Fail-aware untrusted storage
-
Cachin, C., Keidar, I., Shraer, A.: Fail-aware untrusted storage. In: Proc. International Conference on Dependable Systems and Networks (DSN-DCCS), pp. 494-503 (2009)
-
(2009)
Proc. International Conference on Dependable Systems and Networks (DSN-DCCS
, pp. 494-503
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
4
-
-
36849043102
-
Efficient fork-linearizable access to untrusted shared memory
-
Cachin, C., Shelat, A., Shraer, A.: Efficient fork-linearizable access to untrusted shared memory. In: Proc. 26th ACMSymposium on Principles of Distributed Computing (PODC), pp. 129-138 (2007)
-
(2007)
Proc. 26th ACMSymposium on Principles of Distributed Computing (PODC
, pp. 129-138
-
-
Cachin, C.1
Shelat, A.2
Shraer, A.3
-
5
-
-
77951174705
-
Replication: Theory and practice
-
Springer, Heidelberg
-
Charron-Bost, B., Pedone, F., Schiper, A. (eds.): Replication: Theory and Practice. LNCS, vol. 5959. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5959
-
-
Charron-Bost, B.1
Pedone, F.2
Schiper, A.3
-
6
-
-
59249102694
-
Attested append-only memory: Making adversaries stick to their word
-
Chun, B.G.,Maniatis, P., Shenker, S., Kubiatowicz, J.: Attested append-only memory: Making adversaries stick to their word. In: Proc. 21st ACM Symposium on Operating System Principles (SOSP), pp. 189-204 (2007)
-
(2007)
Proc. 21st ACM Symposium on Operating System Principles (SOSP)
, pp. 189-204
-
-
Chun, B.G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
7
-
-
84878569015
-
Tiered fault tolerance for longterm integrity
-
Chun, B.G., Maniatis, P., Shenker, S., Kubiatowicz, J.: Tiered fault tolerance for longterm integrity. In: Proc. 7th USENIX Conference on File and Storage Technologies, FAST (2009)
-
(2009)
Proc. 7th USENIX Conference on File and Storage Technologies, FAST
-
-
Chun, B.G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
8
-
-
78751669942
-
-
Cloud Security Alliance, CSA (2010), http://www.cloudsecurityalliance. org/
-
(2010)
-
-
-
9
-
-
79955976870
-
SPORC: Group collaboration using untrusted cloud resources
-
Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: Group collaboration using untrusted cloud resources. In: Proc. 9th Symp. Operating Systems Design and Implementation, OSDI (2010)
-
(2010)
Proc. 9th Symp. Operating Systems Design and Implementation, OSDI
-
-
Feldman, A.J.1
Zeller, W.P.2
Freedman, M.J.3
Felten, E.W.4
-
10
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
Haeberlen, A., Kouznetsov, P., Druschel, P.: PeerReview: Practical accountability for distributed systems. In: Proc. 21st ACM Symposium on Operating System Principles (SOSP), pp. 175-188 (2007)
-
(2007)
Proc. 21st ACM Symposium on Operating System Principles (SOSP)
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
12
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
Li, J., Krohn, M., Mazires, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: Proc. 6th Symp. Operating Systems Design and Implementation (OSDI), pp. 121-136 (2004)
-
(2004)
Proc. 6th Symp. Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazires, D.3
Shasha, D.4
-
13
-
-
79955969463
-
Depot: Cloud storage with minimal trust
-
Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., Walfish, M.: Depot: Cloud storage with minimal trust. In: Proc. 9th Symp. Operating Systems Design and Implementation, OSDI (2010)
-
(2010)
Proc. 9th Symp. Operating Systems Design and Implementation, OSDI
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
14
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39, 21-41 (2004)
-
(2004)
Algorithmica
, vol.39
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
17
-
-
68849097095
-
Authenticated hash tables
-
Papamanthou, C., Tamassia, R., Triandopoulos, N.: Authenticated hash tables. In: Proc. 15th ACM Conference on Computer and Communications Security, CCS (2008)
-
(2008)
Proc. 15th ACM Conference on Computer and Communications Security, CCS
-
-
Papamanthou, C.1
Tamassia, R.2
Triandopoulos, N.3
-
18
-
-
78650085550
-
Venus: Verification for untrusted cloud storage
-
ACM, New York
-
Shraer, A., Cachin, C., Cidon, A., Keidar, I., Michalevsky, Y., Shaket, D.: Venus: Verification for untrusted cloud storage. In: Proc. Cloud Computing Security Workshop (CCSW). ACM, New York (2010)
-
(2010)
Proc. Cloud Computing Security Workshop (CCSW)
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
19
-
-
26444561838
-
Computational bounds on hierarchical data processing with applications to information security
-
Caires, L., et al. (eds.), ICALP 2005, Springer, Heidelberg
-
Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: Caires, L., et al. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 153-165. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 153-165
-
-
Tamassia, R.1
Triandopoulos, N.2
-
20
-
-
85180620765
-
The blind stone tablet: Outsourcing durability to untrusted parties
-
Williams, P., Sion, R., Shasha, D.: The blind stone tablet: Outsourcing durability to untrusted parties. In: Proc. Network and Distributed Systems Security Symposium, NDSS (2009)
-
(2009)
Proc. Network and Distributed Systems Security Symposium, NDSS
-
-
Williams, P.1
Sion, R.2
Shasha, D.3
|