-
1
-
-
0003969633
-
Trusted computer system evaluation criteria
-
Technical Report DoD 5200.28-STD, Department of Defense, accessed Jan 20, 2010
-
Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, Department of Defense, December 1985. http://csrc.nist.gov/publications/history/dod85.pdf, accessed Jan 20, 2010.
-
(1985)
-
-
-
2
-
-
84865102630
-
Amazon Simple Storage Service Developer Guide (API Version 2006-03-01)
-
Amazon, a, accessed Jan 12
-
Amazon Simple Storage Service Developer Guide (API Version 2006-03-01). Amazon, a. http://docs.amazonwebservices.com/AmazonS3/2006-03-01/, accessed Jan 12, 2010.
-
(2010)
-
-
-
3
-
-
67649141016
-
Amazon Simple Storage Service (Amazon S3)
-
Amazon, b.
-
Amazon Simple Storage Service (Amazon S3). Amazon, b. http://aws.amazon.com/s3/.
-
-
-
-
4
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
0042484568
-
On the inability of an unmodified capability machine to enforce the *-property
-
W. Boebert. On the inability of an unmodified capability machine to enforce the *-property. In 7th DOD/NBS Computer Security Conference, pages 291-293, 1984.
-
(1984)
7th DOD/NBS Computer Security Conference
, pp. 291-293
-
-
Boebert, W.1
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
84865101490
-
ACLs don't
-
T. Close. ACLs don't. http://www.hpl.hp.com/techreports/2009/HPL-2009-20.pdf.
-
-
-
Close, T.1
-
8
-
-
41149092147
-
Dynamo: amazon's highly available key-value store
-
ACM Press
-
G. Decandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: amazon's highly available key-value store. In SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pages 205-220. ACM Press, 2007.
-
(2007)
SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
, pp. 205-220
-
-
Decandia, G.1
Hastorun, D.2
Jampani, M.3
Kakulapati, G.4
Lakshman, A.5
Pilchin, A.6
Sivasubramanian, S.7
Vosshall, P.8
Vogels, W.9
-
9
-
-
84865101104
-
Atmos Online Programmer's Guide
-
EMC, a., accessed Jan 12
-
Atmos Online Programmer's Guide. EMC, a. https://community.emc.com/docs/DOC-3481, accessed Jan 12, 2010.
-
(2010)
-
-
-
10
-
-
84865091331
-
EMC Atmos Online Services
-
EMC, b.
-
EMC Atmos Online Services. EMC, b. http://www.emccis.com/.
-
-
-
-
11
-
-
33947179923
-
The OSD security protocol
-
M. Factor, D. Nagle, D. Naor, E. Riedel, and J. Satran. The OSD security protocol. In IEEE Security in Storage Workshop, pages 29-39, 2005.
-
(2005)
IEEE Security in Storage Workshop
, pp. 29-39
-
-
Factor, M.1
Nagle, D.2
Naor, D.3
Riedel, E.4
Satran, J.5
-
12
-
-
47249111384
-
Capability based secure access control to networked storage devices
-
Washington, DC, USA, 2007. IEEE Computer Society. ISBN 0-7695-3025-7
-
M. Factor, D. Naor, E. Rom, J. Satran, and S. Tal. Capability based secure access control to networked storage devices. In MSST '07: Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies, pages 114-128, Washington, DC, USA, 2007. IEEE Computer Society. ISBN 0-7695-3025-7. doi: http://dx.doi.org/10.1109/MSST.2007.6.
-
(2007)
MSST '07: Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies
, pp. 114-128
-
-
Factor, M.1
Naor, D.2
Rom, E.3
Satran, J.4
Tal, S.5
-
13
-
-
84963744744
-
Principled design of the modern web architecture
-
R. T. Fielding and R. N. Taylor. Principled design of the modern web architecture. ACM Trans. Internet Technol., 2(2): 115-150, May 2002. URL http://dx.doi.org/10.1145/514183.514185.
-
(2002)
ACM Trans. Internet Technol.
, vol.2
, Issue.2
, pp. 115-150
-
-
Fielding, R.T.1
Taylor, R.N.2
-
14
-
-
0003691180
-
Foundations of Cryptography: Basic Tools
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2000.
-
(2000)
-
-
Goldreich, O.1
-
15
-
-
47249132115
-
Enforcing confinement in distributed storage and a cryptographic model for access control
-
Report 2005/169
-
S. Halevi, P. Karger, and D. Naor. Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive, Report 2005/169, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive
-
-
Halevi, S.1
Karger, P.2
Naor, D.3
-
16
-
-
77954595043
-
The OAuth 1.0 Protocol. Internet Engineering Task Force
-
E. Hammer-Lahav. The OAuth 1.0 Protocol. Internet Engineering Task Force, February 2010. http://tools.ietf.org/html/draft-hammer-oauth-10.
-
(2010)
-
-
Hammer-Lahav, E.1
-
17
-
-
74349096866
-
A RESTful approach to the management of cloud infrastructure
-
CLOUD '09, Washington, DC, USA, IEEE Computer Society. ISBN 978-0-7695-3840-2
-
H. Han, S. Kim, H. Jung, H. Y. Yeom, C. Yoon, J. Park, and Y. Lee. A RESTful approach to the management of cloud infrastructure. In Proceedings of the 2009 IEEE International Conference on Cloud Computing, CLOUD '09, pages 139-142, Washington, DC, USA, 2009. IEEE Computer Society. ISBN 978-0-7695-3840-2. doi: http://dx.doi.org/10.1109/CLOUD.2009.68. URL http://dx.doi.org/10.1109/CLOUD.2009.68.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Cloud Computing
, pp. 139-142
-
-
Han, H.1
Kim, S.2
Jung, H.3
Yeom, H.Y.4
Yoon, C.5
Park, J.6
Lee, Y.7
-
18
-
-
33947625881
-
Assessment of Access Control Systems
-
NIST IR 7316
-
V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn. Assessment of Access Control Systems. NIST IR 7316, September 2006. csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf.
-
(2006)
-
-
Hu, V.C.1
Ferraiolo, D.F.2
Kuhn, D.R.3
-
19
-
-
18844441915
-
Fileteller: Paying and getting paid for file storage
-
M. Blaze, editor, volume 2357 of Lecture Notes in Computer Science, Springer, ISBN 3-540-00646-X
-
J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. Fileteller: Paying and getting paid for file storage. In M. Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 282-299. Springer, 2002. ISBN 3-540-00646-X.
-
(2002)
Financial Cryptography
, pp. 282-299
-
-
Ioannidis, J.1
Ioannidis, S.2
Keromytis, A.D.3
Prevelakis, V.4
-
20
-
-
0038253143
-
Improving security and performance for capability systems
-
ph.d. dissertation. Technical Report 149, Cambridge, England
-
P. Karger. Improving security and performance for capability systems, ph.d. dissertation. Technical Report 149, Cambridge, England, 1988.
-
(1988)
-
-
Karger, P.1
-
21
-
-
0021197579
-
An augmented capability architecture to support lattice security and traceability of access
-
P. Karger and A. Herbert. An augmented capability architecture to support lattice security and traceability of access. In IEEE Symposium on Security and Privacy, pages 2-12, 1984.
-
(1984)
IEEE Symposium on Security and Privacy
, pp. 2-12
-
-
Karger, P.1
Herbert, A.2
-
22
-
-
0015672289
-
A note on the confinement problem
-
B. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
23
-
-
56749107608
-
Scalable security for petascale parallel file systems
-
New York, NY, USA, ACM. ISBN 978-1-59593-764-3. doi:
-
A. W. Leung, E. L. Miller, and S. Jones. Scalable security for petascale parallel file systems. In SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing, pages 1-12, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-764-3. doi: http://doi.acm.org/10.1145/1362622.1362644.
-
(2007)
SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing
, pp. 1-12
-
-
Leung, A.W.1
Miller, E.L.2
Jones, S.3
-
24
-
-
49449108308
-
WebDAVA: An administrator-free approach to web file-sharing
-
IEEE Computer Society, ISBN 0-7695-1963-6.
-
A. Levine, V. Prevelakis, J. Ioannidis, S. Ioannidis, and A. D. Keromytis. WebDAVA: An administrator-free approach to web file-sharing. In WETICE, pages 59-64. IEEE Computer Society, 2003. ISBN 0-7695-1963-6.
-
(2003)
WETICE
-
-
Levine, A.1
Prevelakis, V.2
Ioannidis, J.3
Ioannidis, S.4
Keromytis, A.D.5
-
25
-
-
84865067360
-
Are security issues delaying adoption of cloud computing?
-
accessed Jan 21, 2010
-
E. Messmer. Are security issues delaying adoption of cloud computing? Network World, April 2009. http://www.networkworld.com/news/2009/042709-burning-security-cloud-computing.html, accessed Jan 21, 2010.
-
(2009)
Network World
-
-
Messmer, E.1
-
26
-
-
78649988138
-
Windows Azure Platform
-
Microsoft, a.
-
Windows Azure Platform. Microsoft, a. http://www.microsoft.com/windowsazure/windowsazure/.
-
-
-
-
27
-
-
84865064401
-
Windows Azure Storage Services API Reference
-
Microsoft Corp., b, accessed Jan 17
-
Windows Azure Storage Services API Reference. Microsoft Corp., b. http://msdn.microsoft.com/en-us/library/dd179355.aspx, accessed Jan 17, 2010.
-
(2010)
-
-
-
28
-
-
21644432386
-
Secure and flexible global file sharing
-
USENIX, ISBN 1-931971-11-0
-
S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. D. Keromytis, and J. M. Smith. Secure and flexible global file sharing. In USENIX Annual Technical Conference, FREENIX Track, pages 165-178. USENIX, 2003. ISBN 1-931971-11-0.
-
(2003)
USENIX Annual Technical Conference, FREENIX Track
, pp. 165-178
-
-
Miltchev, S.1
Prevelakis, V.2
Ioannidis, S.3
Ioannidis, J.4
Keromytis, A.D.5
Smith, J.M.6
-
29
-
-
49449117747
-
Ioannidis. Decentralized access control in distributed file systems
-
ISSN 0360-0300. doi:
-
S. Miltchev, J. M. Smith, V. Prevelakis, A. Keromytis, and S. Ioannidis. Decentralized access control in distributed file systems. ACM Comput. Surv., 40(3):1-30, 2008. ISSN 0360-0300. doi: http://doi.acm.org/10.1145/1380584.1380588.
-
(2008)
ACM Comput. Surv.
, vol.40
, Issue.3
, pp. 1-30
-
-
Miltchev, S.1
Smith, J.M.2
Prevelakis, V.3
Keromytis, A.4
Ioannidis, S.5
-
30
-
-
84865106752
-
Cloud storage triggers security worries.
-
accessed Jan 21, 2010.
-
R. L. Mitchel. Cloud storage triggers security worries. Computerworld, July 2009. http://www.computerworld.com/s/article/340438/ Confidence_in_the_Cloud, accessed Jan 21, 2010.
-
(2009)
Computerworld
-
-
Mitchel, R.L.1
-
31
-
-
55449106518
-
The ANSI T10 object-based storage standard and current implementations
-
D. Nagle, M. Factor, S. Iren, D. Naor, E. Riedel, O. Rodeh, and J. Satran. The ANSI T10 object-based storage standard and current implementations. IBM Journal of Research and Development, 52(4-5):401-412, 2008.
-
(2008)
IBM Journal of Research and Development
, vol.52
, Issue.4-5
, pp. 401-412
-
-
Nagle, D.1
Factor, M.2
Iren, S.3
Naor, D.4
Riedel, E.5
Rodeh, O.6
Satran, J.7
-
32
-
-
84865079526
-
Nirvanix Web Services API Developer's Guide
-
Nirvanix, a., accessed Jan 13
-
Nirvanix Web Services API Developer's Guide. Nirvanix, a. http://developer.nirvanix.com/sitefiles/1000/API.html, accessed Jan 13, 2010.
-
(2010)
-
-
-
33
-
-
84865102627
-
Nirvanix Storage Delivery Network
-
Nirvanix, b.
-
Nirvanix Storage Delivery Network. Nirvanix, b. http://www.nirvanix.com/.
-
-
-
-
34
-
-
70449433284
-
Identification and authentication in large-scale storage systems
-
International Conference on, 0:421-427
-
Z. Niu, H. Jiang, K. Zhou, T. Yang, and W. Yan. Identification and authentication in large-scale storage systems. Networking, Architecture, and Storage, International Conference on, 0:421-427, 2009.
-
(2009)
Networking, Architecture, and Storage
-
-
Niu, Z.1
Jiang, H.2
Zhou, K.3
Yang, T.4
Yan, W.5
-
35
-
-
84865101492
-
ParaScale Storage Cloud Supports Virtual File System
-
ParaScale Storage Cloud Supports Virtual File System. ParaScale. http://www.parascale.com/index.php/products/data-access-security.
-
ParaScale
-
-
-
36
-
-
57349153899
-
Restful web services vs. "big"' web services: making the right architectural decision
-
WWW '08, New York, NY, USA, ACM. ISBN 978-1-60558-085-2.
-
C. Pautasso, O. Zimmermann, and F. Leymann. Restful web services vs. "big"' web services: making the right architectural decision. In Proceeding of the 17th international conference on World Wide Web, WWW '08, pages 805-814, New York, NY, USA, 2008. ACM. ISBN 978-1-60558-085-2. doi: http://doi.acm.org/10.1145/1367497.1367606. URL http://doi.acm.org/10.1145/1367497.1367606.
-
(2008)
Proceeding of the 17th international conference on World Wide Web
, pp. 805-814
-
-
Pautasso, C.1
Zimmermann, O.2
Leymann, F.3
-
37
-
-
84865065239
-
The Rackspace Cloud: Cloud Files
-
The Rackspace Cloud: Cloud Files. Rackspace. http://www.rackspacecloud.com/cloud_hosting_products/files/.
-
-
-
-
38
-
-
79952045295
-
Security Assertion Markup Language (SAML) V2.0 Technical Overview
-
N. Ragouzis, J. Hughes, R. Philpott, E. Maler, P. Madsen, and T. Scavo. Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft, March 2008. http://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf.
-
(2008)
OASIS Committee Draft
-
-
Ragouzis, N.1
Hughes, J.2
Philpott, R.3
Maler, E.4
Madsen, P.5
Scavo, T.6
-
39
-
-
0033906295
-
Authenticating network-attached storage
-
ISSN 0272-1732. doi:
-
B. C. Reed, E. G. Chron, R. C. Burns, and D. D. Long. Authenticating network-attached storage. IEEE Micro, 20:49-57, 2000. ISSN 0272-1732. doi: http://doi.ieeecomputersociety.org/10.1109/40.820053.
-
(2000)
IEEE Micro
, vol.20
, pp. 49-57
-
-
Reed, B.C.1
Chron, E.G.2
Burns, R.C.3
Long, D.D.4
-
40
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. In Proc. IEEE, 63(9):1278-1308, 1975. http://web.mit.edu/Saltzer/www/publications/protection.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
41
-
-
78651556127
-
Eventually consistent
-
ISSN 1542-7730
-
W. Vogels. Eventually consistent. Queue, 6(6):14-19, 2008. ISSN 1542-7730.
-
(2008)
Queue
, vol.6
, Issue.6
, pp. 14-19
-
-
Vogels, W.1
-
42
-
-
85038881415
-
Ceph: A scalable, high-performance distributed file system
-
USENIX Association
-
S. A. Weil, S. A. Brandt, E. L. Miller, D. D. E. Long, and C. Maltzahn. Ceph: A scalable, high-performance distributed file system. In OSDI, pages 307-320. USENIX Association, 2006.
-
(2006)
OSDI
, pp. 307-320
-
-
Weil, S.A.1
Brandt, S.A.2
Miller, E.L.3
Long, D.D.E.4
Maltzahn, C.5
-
43
-
-
84865101491
-
Security is chief obstacle to cloud computing adoption, study says
-
accessed Jan 21, 2010
-
T. Wilson. Security is chief obstacle to cloud computing adoption, study says. DarkReading: Security, November 2009. http://www.darkreading.com/securityservices/security/perimeter/showArticle.jhtml?articleID=221901195, accessed Jan 21, 2010.
-
(2009)
DarkReading: Security
-
-
Wilson, T.1
|