-
1
-
-
80051911576
-
Cryptographic cloud storage
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in RLCPS, 2010.
-
(2010)
RLCPS
-
-
Kamara, S.1
Lauter, K.2
-
2
-
-
68249129760
-
-
University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28
-
M. Armbrust, A. Fox, and et al., "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28.
-
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
-
3
-
-
84861635618
-
-
http://www.dropbox.com/.
-
-
-
-
6
-
-
79958862079
-
Robustore: A distributed storage architecture with robust and high performance
-
H. Xia and A. A. Chien, "Robustore: a distributed storage architecture with robust and high performance," in Proc. of Supercomputing, 2007.
-
Proc. of Supercomputing, 2007
-
-
Xia, H.1
Chien, A.A.2
-
7
-
-
18344385312
-
Erasure coding vs. replication: A quantitative comparison
-
H. Weatherspoon and J. D. Kubiatowicz, "Erasure coding vs. replication: A quantitative comparison," in IPTPS, 2002.
-
(2002)
IPTPS
-
-
Weatherspoon, H.1
Kubiatowicz, J.D.2
-
8
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
New York, NY, USA: ACM
-
J. Kubiatowicz, D. Bindel, Y. Chen, and et al, "OceanStore: an architecture for global-scale persistent storage," in ASPLOS. New York, NY, USA: ACM, 2000.
-
(2000)
ASPLOS
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
-
9
-
-
25844511502
-
Total recall: System support for automated availability management
-
R. B. Kiran, K. Tati, Y. chung Cheng, S. Savage, and G. M. Voelker, "Total recall: System support for automated availability management,"in Proc. of NSDI, 2004.
-
Proc. of NSDI, 2004
-
-
Kiran, R.B.1
Tati, K.2
Chung Cheng, Y.3
Savage, S.4
Voelker, G.M.5
-
10
-
-
77955726417
-
Network coding for distributed storage systems
-
A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," ITIT, 2010.
-
(2010)
ITIT
-
-
Dimakis, A.1
Godfrey, P.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
11
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. Reed and G. Solomon, "Polynomial codes over certain finite fields,"Journal of the SIAM, 1960.
-
(1960)
Journal of the SIAM
-
-
Reed, I.1
Solomon, G.2
-
12
-
-
84861622985
-
Remote data checking for network coding-based distributed storage systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote data checking for network coding-based distributed storage systems," in Proc. of CCSW '10, 2010.
-
Proc. of CCSW '10, 2010
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
13
-
-
79951954266
-
A construction of systematic mds codes with minimum repair bandwidth
-
Y. Wu, "A construction of systematic mds codes with minimum repair bandwidth," in IEEE Trans. Inf. Theory, 2009.
-
(2009)
IEEE Trans. Inf. Theory
-
-
Wu, Y.1
-
14
-
-
79957656082
-
Exact regenerating codes for distributed storage
-
K. V. Rashmi, N. B. Shah, P. V. Kumar, and K. Ramchandran, "Exact regenerating codes for distributed storage," in Proc. Allerton Conf. Control Comput. Commun., 2009, pp. 337-350.
-
Proc. Allerton Conf. Control Comput. Commun., 2009
, pp. 337-350
-
-
Rashmi, K.V.1
Shah, N.B.2
Kumar, P.V.3
Ramchandran, K.4
-
15
-
-
79951885979
-
-
CoRR, vol. abs/1004.4438
-
A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, "A survey on network codes for distributed storage," CoRR, vol. abs/1004.4438, 2010.
-
(2010)
A Survey on Network Codes for Distributed Storage
-
-
Dimakis, A.G.1
Ramchandran, K.2
Wu, Y.3
Suh, C.4
-
17
-
-
0035246316
-
Efficient erasure correcting codes
-
M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman, "Efficient erasure correcting codes," ITIT, no. 2, pp. 569-584, 2001.
-
(2001)
ITIT
, Issue.2
, pp. 569-584
-
-
Luby, M.G.1
Mitzenmacher, M.2
Shokrollahi, M.A.3
Spielman, D.A.4
-
18
-
-
77955906586
-
Lt network codes
-
M.-L. Champel, K. Huguenin, A.-M. Kermarrec, and N. L. Scouarnec, "Lt network codes," Proc. of ICDCS, pp. 536-546, 2010.
-
(2010)
Proc. of ICDCS
, pp. 536-546
-
-
Champel, M.-L.1
Huguenin, K.2
Kermarrec, A.-M.3
Scouarnec, N.L.4
-
20
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of INFOCOM, 2010.
-
Proc. of INFOCOM, 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
21
-
-
33947399169
-
A random linear network coding approach to multicast
-
T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast,"ITIT, 2006.
-
(2006)
ITIT
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Shi, J.6
Leong, B.7
-
22
-
-
0037703307
-
Polynomial time algorithms for network information flow
-
P. Sanders, S. Egner, and L. Tolhuizen, "Polynomial time algorithms for network information flow," in Proc. of SPAA, 2003, pp. 286-294.
-
Proc. of SPAA, 2003
, pp. 286-294
-
-
Sanders, P.1
Egner, S.2
Tolhuizen, L.3
-
23
-
-
84861602283
-
Tree-structured data regeneration in distributed storage systems with regenerating codes
-
J. Li, S. Yang, X. Wang, X. Xue, and B. Li, "Tree-structured data regeneration in distributed storage systems with regenerating codes," in Proc. of IWQoS, July 2009.
-
Proc. of IWQoS, July 2009
-
-
Li, J.1
Yang, S.2
Wang, X.3
Xue, X.4
Li, B.5
-
24
-
-
70350241664
-
A practical study of regenerating codes for peer-to-peer backup systems
-
A. Duminuco and E. Biersack, "A practical study of regenerating codes for peer-to-peer backup systems," in Proc. of ICDCS, June 2009.
-
Proc. of ICDCS, June 2009
-
-
Duminuco, A.1
Biersack, E.2
-
25
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
New York, NY, USA: ACM
-
A. Juels and B. S. Kaliski, Jr., "Pors: proofs of retrievability for large files," in Pro. of CCS. New York, NY, USA: ACM, 2007, pp. 584-597.
-
(2007)
Pro. of CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
26
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS, 2009.
-
Proc. of IWQoS, 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
27
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea, "Hail: a high-availability and integrity layer for cloud storage," in Proc. of CCS, 2009.
-
Proc. of CCS, 2009
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
28
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York, NY, USA: ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of CCS. New York, NY, USA: ACM, 2007.
-
(2007)
Proceedings of CCS
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
29
-
-
51849117195
-
Mr-pdp: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "Mr-pdp: Multiple-replica provable data possession," in Proc. of ICDCS, 2008.
-
Proc. of ICDCS, 2008
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
|