메뉴 건너뛰기




Volumn , Issue , 2011, Pages 457-465

A fair multi-party non-repudiation scheme for storage clouds

Author keywords

Cloud Storage; Non repudiation

Indexed keywords

DATA INTEGRITY; DATA STORAGE; NETWORK ATTACK; NON-REPUDIATION; SERVICE MODEL; STORAGE SERVICES;

EID: 83255162621     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CTS.2011.5928724     Document Type: Conference Paper
Times cited : (15)

References (33)
  • 1
    • 44949123778 scopus 로고    scopus 로고
    • A Fair Nonrepudiation Service in a Web Service Peer-to-Peer Environment
    • August
    • B. Agreiter, M. Hafner, and R. Breu, "A Fair Nonrepudiation Service in a Web Service Peer-to-Peer Environment," Computer Standards & Interfaces, vol 30, no 6, pp372-378, August 2008.
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.6 , pp. 372-378
    • Agreiter, B.1    Hafner, M.2    Breu, R.3
  • 3
    • 24944498581 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters, "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys," Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 5
    • 67349211491 scopus 로고    scopus 로고
    • Secure Multi-Party Payment with an Intermediary Entity
    • July
    • M. Carbonell, J. M. Sierra, and J. Lopez, "Secure Multi-Party Payment with an Intermediary Entity," Computers & Security, vol 28, no 5, pp289-300, July 2009.
    • (2009) Computers & Security , vol.28 , Issue.5 , pp. 289-300
    • Carbonell, M.1    Sierra, J.M.2    Lopez, J.3
  • 6
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • Aug
    • G. Chiou and W. Chen, "Secure broadcasting using the secure lock," IEEE Transactions on Software Engineering, vol 15, no 8, pp929-934, Aug. 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.1    Chen, W.2
  • 7
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the Cloud: Outsourcing computation without outsourcing control
    • November 13; Chicago, IL. NY ACM
    • R.Chow, P.Golle, M.Jakobsson, E.Shi, J.Staddon, R.Masuoka, and J.Molina, "Controlling data in the Cloud: outsourcing computation without outsourcing control", Proceedings of CCSW 2009, November 13; Chicago, IL. NY: ACM; 2009; 85-90.
    • (2009) Proceedings of CCSW , pp. 85-90
    • Chow, R.1    Golle, P.2    Jakobsson, M.3    Shi, E.4    Staddon, J.5    Masuoka, R.6    Molina, J.7
  • 12
    • 84864878412 scopus 로고    scopus 로고
    • Assessing the security risks of cloud computing
    • June 2
    • J. Heiser and M. Nicolett, "Assessing the Security Risks of Cloud Computing," Gartner Inc., June 2, 2008.
    • (2008) Gartner Inc.
    • Heiser, J.1    Nicolett, M.2
  • 13
    • 74049103479 scopus 로고    scopus 로고
    • Proofs of retrievability for large files
    • A. Juels and B. S. K. Jr. Pors: "Proofs of retrievability for large files". In Proc. ACM CCS, pages 584-597, 2007
    • (2007) Proc. ACM CCS , pp. 584-597
    • Juels, A.1    Pors Jr., B.S.K.2
  • 14
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," In USENIX FAST, pages 29 ~ 42, 2003.
    • (2003) USENIX FAST , vol.42 , pp. 29
    • Kallahalla, M.1    Riedel, E.2    Swaminathan, R.3    Wang, Q.4    Fu, K.5
  • 16
    • 84900847325 scopus 로고    scopus 로고
    • Improving fairness and privacy of zhou-gollmann's fair non-repudiation protocol
    • Aizu, Japan, September
    • K. Kim, S. Park, and J. Baek, "Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-repudiation Protocol," Proceedings of 1999 ICPP Workshop on Security, pp 140-145, Aizu, Japan, September 1999.
    • (1999) Proceedings of 1999 ICPP Workshop on Security , pp. 140-145
    • Kim, K.1    Park, S.2    Baek, J.3
  • 17
    • 33244454312 scopus 로고    scopus 로고
    • Securing distributed storage: Challenges, techniques, and systems
    • Fairfax, Virginia, USA
    • V. Kher and Y. Kim, "Securing distributed storage: challenges, techniques, and systems", Proceedings of the 2005 ACM workshop on Storage (StorageSS'05), pp9-25, Fairfax, Virginia, USA, 2005.
    • Proceedings of the 2005 ACM Workshop on Storage (StorageSS'05 , vol.2005 , pp. 9-25
    • Kher, V.1    Kim, Y.2
  • 18
  • 19
    • 0039013903 scopus 로고    scopus 로고
    • Some guidelines for non-repudiation protocols
    • October
    • P. Louridas, "Some Guidelines for Non-repudiation Protocols," Computer Communication Review, vol 30, no 5, October 2000.
    • (2000) Computer Communication Review , vol.30 , Issue.5
    • Louridas, P.1
  • 24
    • 78649328969 scopus 로고    scopus 로고
    • Secure multi-party nonrepudiation protocols and applications," ISBN 978-0-387-75629-5
    • Springer
    • J. Onieva, J. Lopez, and J. Zhou, "Secure Multi-Party Nonrepudiation Protocols and Applications," ISBN 978-0-387-75629-5, Advances in Info. Security Series, Springer, 2009.
    • (2009) Advances in Info. Security Series
    • Onieva, J.1    Lopez, J.2    Zhou, J.3
  • 32
    • 83255163356 scopus 로고    scopus 로고
    • http://www.certicom.com/index.php/software-securitysolutions
  • 33
    • 83255172142 scopus 로고    scopus 로고
    • Nov
    • Privacy in the Cloud Computing Era, http://download.microsoft.com/ download/3/9/1/3912E37E-5D7A-4775-B677-B7C2BAF10807/cloud-privacy-wp-102809.pdf, Nov, 2010.
    • (2010) Privacy in the cloud computing era


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.