-
1
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, "Oceanstore: An Architecture for Global-Scale Persistent Storage," Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, 2000. (Pubitemid 32470898)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
3
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, "Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002.
-
(2002)
Proc. Fifth Symp. Operating System Design and Implementation (OSDI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
4
-
-
85001706405
-
Glacier: Highly durable, decentralized storage despite massive correlated failures
-
A. Haeberlen, A. Mislove, and P. Druschel, "Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures," Proc. Second Symp. Networked Systems Design and Implementation (NSDI), pp. 143-158, 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI
, pp. 143-158
-
-
Haeberlen, A.1
Mislove, A.2
Druschel, P.3
-
6
-
-
77957752994
-
A secure decentralized erasure code for distributed network storage
-
Nov
-
H.-Y. Lin and W.-G. Tzeng, "A Secure Decentralized Erasure Code for Distributed Network Storage," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 11, pp. 1586-1594, Nov. 2010.
-
(2010)
IEEE Trans. Parallel and Distributed Systems
, vol.21
, Issue.11
, pp. 1586-1594
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
7
-
-
0020292962
-
Newcastle connection or unixes of the world unite!
-
D.R. Brownbridge, L.F. Marshall, and B. Randell, "The Newcastle Connection or Unixes of the World Unite!," Software Practice and Experience, vol. 12, no. 12, pp. 1147-1162, 1982. (Pubitemid 13487946)
-
(1982)
Software - Practice and Experience
, vol.12
, Issue.12
, pp. 1147-1162
-
-
Brownbridge, D.R.1
Marshall, L.F.2
Randell, B.3
-
8
-
-
0000432429
-
Design and implementation of the sun network filesystem
-
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon, "Design and Implementation of the Sun Network Filesystem," Proc. USENIX Assoc. Conf., 1985.
-
(1985)
Proc. USENIX Assoc. Conf.
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
-
9
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. Second USENIX Conf. File and Storage Technologies (FAST), pp. 29-42, 2003.
-
(2003)
Proc. Second USENIX Conf. File and Storage Technologies (FAST
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
10
-
-
84943547553
-
Pond: The oceanstore prototype
-
S.C. Rhea, P.R. Eaton, D. Geels, H. Weatherspoon, B.Y. Zhao, and J. Kubiatowicz, "Pond: The Oceanstore Prototype," Proc. Second USENIX Conf. File and Storage Technologies (FAST), pp. 1-14, 2003.
-
(2003)
Proc. Second USENIX Conf. File and Storage Technologies (FAST
, pp. 1-14
-
-
Rhea, S.C.1
Eaton, P.R.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.Y.5
Kubiatowicz, J.6
-
11
-
-
77955897418
-
Total recall: System support for automated availability management
-
R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G.M. Voelker, "Total Recall: System Support for Automated Availability Management," Proc. First Symp. Networked Systems Design and Implementation (NSDI), pp. 337-350, 2004.
-
(2004)
Proc. First Symp. Networked Systems Design and Implementation (NSDI
, pp. 337-350
-
-
Bhagwan, R.1
Tati, K.2
Cheng, Y.-C.3
Savage, S.4
Voelker, G.M.5
-
12
-
-
33744932422
-
Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes
-
DOI 10.1109/IPSN.2005.1440909, 1440909, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
-
A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Ubiquitous Access to Distributed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes," Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 111-117, 2005. (Pubitemid 43841222)
-
(2005)
2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
, vol.2005
, pp. 111-117
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
13
-
-
33745180496
-
Decentralized erasure codes for distributed networked storage
-
DOI 10.1109/TIT.2006.874535
-
A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized Erasure Codes for Distributed Networked Storage," IEEE Trans. Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006. (Pubitemid 43898929)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2809-2816
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
14
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts," IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences, vol. E80-A, no. 1, pp. 54-63, 1997.
-
(1997)
IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
15
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible Protocols and Atomic Proxy Cryptography," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 127-144, 1998. (Pubitemid 128081481)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
16
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
-
(2006)
ACM Trans. Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
18
-
-
67650135696
-
Key-private proxy re-encryption
-
G. Ateniese, K. Benson, and S. Hohenberger, "Key-Private Proxy Re-Encryption," Proc. Topics in Cryptology (CT-RSA), pp. 279-294, 2009.
-
(2009)
Proc. Topics in Cryptology (CT-RSA
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
20
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS), pp. 598-609, 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
21
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Netowrks (SecureComm), pp. 1-10, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Netowrks (SecureComm
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
23
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage from Homomorphic Identification Protocols," Proc. 15th Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 319-333, 2009.
-
(2009)
Proc. 15th Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
24
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K.D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Proc. 16th ACM Conf. Computer and Comm. Security (CCS), pp. 187-198, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
25
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE 29th Int'l Conf. Computer Comm. (INFOCOM), pp. 525-533, 2010.
-
(2010)
Proc. IEEE 29th Int'l Conf. Computer Comm. (INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
26
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," ACM Comm., vol. 22, pp. 612-613, 1979.
-
(1979)
ACM Comm.
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
79955995661
-
Hydrastor: A scalable secondary storage
-
C. Dubnicki, L. Gryz, L. Heldt, M. Kaczmarczyk, W. Kilian, P. Strzelczak, J. Szczepkowski, C. Ungureanu, and M. Welnicki, "Hydrastor: A Scalable Secondary Storage," Proc. Seventh Conf. File and Storage Technologies (FAST), pp. 197-210, 2009.
-
(2009)
Proc. Seventh Conf. File and Storage Technologies (FAST
, pp. 197-210
-
-
Dubnicki, C.1
Gryz, L.2
Heldt, L.3
Kaczmarczyk, M.4
Kilian, W.5
Strzelczak, P.6
Szczepkowski, J.7
Ungureanu, C.8
Welnicki, M.9
-
28
-
-
85077053402
-
Hydrafs: A high-throughput file system for the hydrastor content-addressable storage system
-
C. Ungureanu, B. Atkin, A. Aranya, S. Gokhale, S. Rago, G. Calkowski, C. Dubnicki, and A. Bohra, "Hydrafs: A High-Throughput File System for the Hydrastor Content-Addressable Storage System," Proc. Eighth USENIX Conf. File and Storage Technologies (FAST), p. 17, 2010.
-
(2010)
Proc. Eighth USENIX Conf. File and Storage Technologies (FAST
, pp. 17
-
-
Ungureanu, C.1
Atkin, B.2
Aranya, A.3
Gokhale, S.4
Rago, S.5
Calkowski, G.6
Dubnicki, C.7
Bohra, A.8
-
29
-
-
85077072489
-
Tradeoffs in scalable data routing for deduplication clusters
-
W. Dong, F. Douglis, K. Li, H. Patterson, S. Reddy, and P. Shilane, "Tradeoffs in Scalable Data Routing for Deduplication Clusters," Proc. Ninth USENIX Conf. File and Storage Technologies (FAST), p. 2, 2011.
-
(2011)
Proc. Ninth USENIX Conf. File and Storage Technologies (FAST
, pp. 2
-
-
Dong, W.1
Douglis, F.2
Li, K.3
Patterson, H.4
Reddy, S.5
Shilane, P.6
|