-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. of ACM CCS, 2007.
-
Proc. of ACM CCS, 2007
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
79959823910
-
Remote data checking using provable data possession
-
June
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans. Inf. Syst. Secur., vol. 14, June 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
5
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-replica provable data possession," in Proc. of ICDCS, 2008.
-
Proc. of ICDCS, 2008
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
7
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS, 2009.
-
Proc. of IWQoS, 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
8
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote data checking for network coding-based distributed storage systems," in Proc. of ACM CCSW, 2010.
-
Proc. of ACM CCSW, 2010
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
9
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. of SecureComm, 2008.
-
Proc. of SecureComm, 2008
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
10
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. of ACM CCS, 2009.
-
Proc. of ACM CCS, 2009
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
11
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. of FAST, 2003.
-
Proc. of FAST, 2003
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
12
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. Krohn, D. Mazìeres, and D. Shasha, "Secure untrusted data repository (SUNDR)," in Proceedings of the Symposium on Operating Systems Design and Implementation, 2004.
-
Proceedings of the Symposium on Operating Systems Design and Implementation, 2004
-
-
Li, J.1
Krohn, M.2
Mazìeres, D.3
Shasha, D.4
-
14
-
-
17544377746
-
Oceanstore: An architecture for global-scale persistent storage
-
November
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, "Oceanstore: an architecture for global-scale persistent storage," SIGPLAN Not., vol. 35, pp. 190-201, November 2000.
-
(2000)
SIGPLAN Not.
, vol.35
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
15
-
-
84978427421
-
Ivy: A read/write peer-to-peer file system
-
A. A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen, "Ivy: A read/write peer-to-peer file system," in Proceedings of 5th Symposium on Operating Systems Design and Implementation, 2002.
-
Proceedings of 5th Symposium on Operating Systems Design and Implementation, 2002
-
-
Muthitacharoen, A.A.1
Morris, R.2
Gil, T.M.3
Chen, B.4
-
17
-
-
84865472153
-
-
Microsoft Research, Tech. Rep. MSR-TR-2011-58
-
S. Kamara, C. Papamanthou, and T. Roeder, "CS2: A semantic cryptographic cloud storage system," Microsoft Research, Tech. Rep. MSR-TR-2011-58, 2011.
-
(2011)
CS2: A Semantic Cryptographic Cloud Storage System
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
20
-
-
84866397408
-
Iris: A scalable cloud file system with efficient integrity checks
-
Tech. Rep. 2011/585
-
E. Stefanov, M. van Dijk, A. Oprea, and A. Juels, "Iris: A scalable cloud file system with efficient integrity checks," IACR ePrint Cryptography Archive, Tech. Rep. 2011/585, 2011.
-
(2011)
IACR EPrint Cryptography Archive
-
-
Stefanov, E.1
Van Dijk, M.2
Oprea, A.3
Juels, A.4
-
22
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. on Parallel and Distributed Syst., vol. 22, no. 5, May 2011.
-
(2011)
IEEE Trans. on Parallel and Distributed Syst.
, vol.22
, Issue.5
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
23
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp. 300-304, 1960.
-
(1960)
Journal of the Society for Industrial and Applied Mathematics
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
24
-
-
34247250849
-
Optimizing cauchy reed-solomon codes for fault-tolerant network storage applications
-
J. S. Plank and L. Xu, "Optimizing cauchy reed-solomon codes for fault-tolerant network storage applications," Proc. of IEEE NCA '06, 2006.
-
(2006)
Proc. of IEEE NCA '06
-
-
Plank, J.S.1
Xu, L.2
-
25
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. of the ACM, vol. 36, no. 2, 1989.
-
(1989)
J. of the ACM
, vol.36
, Issue.2
-
-
Rabin, M.O.1
-
26
-
-
0003471197
-
-
International Computer Science Institute, Tech. Rep. TR-95-048, August
-
J. Blomer, M. Kalfane, R. Karp, M. Karpinski, M. Luby, and D. Zuckerman, "An xor-based erasure-resilient coding scheme," International Computer Science Institute, Tech. Rep. TR-95-048, August 1995.
-
(1995)
An Xor-based Erasure-resilient Coding Scheme
-
-
Blomer, J.1
Kalfane, M.2
Karp, R.3
Karpinski, M.4
Luby, M.5
Zuckerman, D.6
-
27
-
-
51049104782
-
Erasure codes for storage applications
-
Tutorial Slides, presented at San Francisco, CA
-
J. S. Plank, "Erasure codes for storage applications," Tutorial Slides, presented at FAST-2005: 4th Usenix Conference on File and Storage Technologies, http://www.cs.utk.edu/~plank/plank/papers/FAST-2005.html, San Francisco, CA, 2005.
-
(2005)
FAST-2005: 4th Usenix Conference on File and Storage Technologies
-
-
Plank, J.S.1
-
29
-
-
51749124474
-
-
University of Tennessee, Tech. Rep. CS-08-627, August
-
J. S. Plank, S. Simmerman, and C. D. Schuman, "Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2," University of Tennessee, Tech. Rep. CS-08-627, August 2008.
-
(2008)
Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications - Version 1.2
-
-
Plank, J.S.1
Simmerman, S.2
Schuman, C.D.3
-
32
-
-
84866423890
-
-
"OpenSSL," http://www.openssl.org/.
-
OpenSSL
-
-
-
33
-
-
84866360400
-
-
"Eclipse," http://archive.eclipse.org/arch/.
-
Eclipse
-
-
|