-
1
-
-
84863270564
-
Collaborative integrity verification in hybrid clouds
-
CollaborateCom, Orlando, FL, USA, 15-18 October
-
Y. Zhu, H. Hu, G. J. Ahn, Y. Han and S. Chen, Collaborative integrity verification in hybrid clouds, in Proc. 7th Int. Conf. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom, Orlando, FL, USA, 15-18 October, 2011), pp. 191-200.
-
(2011)
Proc. 7th Int. Conf. Collaborative Computing: Networking, Applications and Worksharing
, pp. 191-200
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Han, Y.4
Chen, S.5
-
2
-
-
70349456218
-
Virtual infrastructure management in private and hybrid clouds
-
B. Sotomayor, R. S. Montero, I. M. Llorente and I. T. Foster, Virtual infrastructure management in private and hybrid clouds, IEEE Internet Comput. 13(5) (2009) 14- 22.
-
(2009)
IEEE Internet Comput
, vol.13
, Issue.5
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.S.2
Llorente, I.M.3
Foster, I.T.4
-
3
-
-
80955157896
-
Trusted platform-as a service: A foundation for trustworthy cloud-hosted applications
-
CCSW, eds
-
A. Brown and J. S. Chase, Trusted platform-as-a-service: A foundation for trustworthy cloud-hosted applications, in CCSW, eds. C. Cachin and T. Ristenpart (ACM, 2011), pp. 15-20.
-
(2011)
C. Cachin and T. Ristenpart ACM
, pp. 15-20
-
-
Brown, A.1
Chase, J.S.2
-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
CCS, Alexandria, Virginia, USA 28-31 October
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson and D. X. Song, Provable data possession at untrusted stores, in ACM Conf. Computer and Communications Security (CCS, Alexandria, Virginia, USA, 28-31 October, 2007), pp. 598-609.
-
(2007)
ACM Conf. Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
5
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM, New York, NY, USA
-
G. Ateniese, R. D. Pietro, L. V. Mancini and G. Tsudik, Scalable and efficient provable data possession, in Proc. 4th Int. Conf. Security and Privacy in Communication Networks, SecureCommunication (ACM, New York, NY, USA, 2008), pp. 1-10.
-
(2008)
Proc. 4th Int. Conf. Security and Privacy in Communication Networks, SecureCommunication
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
6
-
-
74049121230
-
Dynamic provable data possession
-
CCS, Chicago, IL, USA, 9-13 November
-
C. C. Erway, A. Küp̧cü, C. Papamanthou and R. Tamassia, Dynamic provable data possession, in ACM Conf. Computer and Communications Security (CCS, Chicago, IL, USA, 9-13 November, 2009), pp. 213-222.
-
(2009)
ACM Conf. Computer and Communications Security
, pp. 213-222
-
-
Erway, C.C.1
Küp̧cü, A.2
Papamanthou, C.3
Tamassia, R.4
-
8
-
-
83455210839
-
Consensus routing: The internet as a distributed system
-
Berkeley, CA, USA, USENIX Association
-
J. P. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson and A. Venkataramani, Consensus routing: The internet as a distributed system, in NSDI '08: Proc. 5th USENIX Symp. Networked Systems Design and Implementation (Berkeley, CA, USA, USENIX Association, 2008), pp. 351-364.
-
(2008)
NSDI '08: Proc. 5th USENIX Symp. Networked Systems Design and Implementation
, pp. 351-364
-
-
John, J.P.1
Katz-Bassett, E.2
Krishnamurthy, A.3
Anderson, T.4
Venkataramani, A.5
-
9
-
-
84864276011
-
On availability of intermediate data in cloud computations
-
Monte Verità, Switzerland May 18-20
-
S. Y. Ko, I. Hoque, B. Cho and I. Gupta, On availability of intermediate data in cloud computations, in Proc. 12th USENIX Workshop on Hot Topics in Operating Systems (HotOS XII) (Monte Verità, Switzerland, May 18-20, 2009), pp. 1-10.
-
(2009)
Proc. 12th USENIX Workshop on Hot Topics in Operating Systems (HotOS XII)
, pp. 1-10
-
-
Ko, S.Y.1
Hoque, I.2
Cho, B.3
Gupta, I.4
-
10
-
-
72049101634
-
Granules: A lightweight, streaming runtime for cloud computing with support, for map-reduce
-
S. Pallickara, J. Ekanayake and G. Fox, Granules: A lightweight, streaming runtime for cloud computing with support, for map-reduce, in CLUSTER (2009), pp. 1-10.
-
(2009)
CLUSTER
, pp. 1-10
-
-
Pallickara, S.1
Ekanayake, J.2
Fox, G.3
-
11
-
-
77950844750
-
A study of user-friendly hash comparison schemes
-
H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H. Kikuchi, A. Perrig, H.-M. Sun and B.-Y. Yang, A study of user-friendly hash comparison schemes, in ACSAC (2009), pp. 105-114.
-
(2009)
ACSAC
, pp. 105-114
-
-
Hsiao, H.-C.1
Lin, Y.-H.2
Studer, A.3
Studer, C.4
Wang, K.-H.5
Kikuchi, H.6
Perrig, A.7
Sun, H.-M.8
Yang, B.-Y.9
-
12
-
-
84885684056
-
Strong accountability for network storage
-
USENIX
-
A. R. Yumerefendi and J. S. Chase, Strong accountability for network storage, in FAST (USENIX, 2007), pp. 77-92.
-
(2007)
FAST
, pp. 77-92
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
13
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in ESORICS (2009), pp. 355-370.
-
(2009)
ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
15
-
-
79960836433
-
Zero-knowledge proofs of retrievability, Science China
-
(Series F)
-
Y. Zhu, H.Wang, Z. Hu, G.-J. Ahn and H. Hu, Zero-knowledge proofs of retrievability, Science China: Information Sciences (Series F) 54(8) (2011) 1608-1617.
-
(2011)
Information Sciences
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
-
16
-
-
68249129760
-
-
EECS Department University of California, Berkeley, Technical Report UCB/EECS-2009-2028, Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica and M. Zaharia, Above the clouds: A Berkeley view of cloud computing, EECS Department, University of California, Berkeley, Technical Report UCB/EECS-2009-28, Feb (2009).
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
17
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, in Advances in Cryptology (CRYPTO'2001), Vol. 2139 of LNCS (Springer, 2001), pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
18
-
-
21844441675
-
The design and implementation of a next generation name service for the internet
-
DOI 10.1145/1030194.1015504, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
V. Ramasubramanian and E. G. Sirer, The design and implementation of a next generation name service for the internet, in SIGCOMM'04: Proc. 2004 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM, New York, NY, USA, 2004), pp. 331-342. (Pubitemid 40954891)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 331-342
-
-
Ramasubramanian, V.1
Sirer, E.G.2
-
19
-
-
57349169035
-
Hadoop: A framework for running applications on large clusters built of commodity hardware
-
A. Bialecki, M. Cafarella, D. Cutting and O. O'Malley, Hadoop: A framework for running applications on large clusters built of commodity hardware, Tech. Rep. (2005).
-
(2005)
Tech. Rep.
-
-
Bialecki, A.1
Cafarella, M.2
Cutting, D.3
O'Malley, O.4
-
20
-
-
21644437974
-
The google file system
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
S. Ghemawat, H. Gobioff and S.-T. Leung, The google file system, in SOSP'03: Proc. Nineteenth ACM Symp. Operating Systems Principles (ACM, New York, NY, USA, 2003), pp. 29-43. (Pubitemid 40929686)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
21
-
-
58349118819
-
Compact proofs of retrievability
-
Springer
-
H. Shacham and B. Waters, Compact proofs of retrievability, in ASIACRYPT (Springer, 2008), pp. 90-107.
-
(2008)
ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
22
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
CCS, Alexandria, Virginia, USA, 28-31 October
-
A. Juels and B. S. K. Jr., Pors: Proofs of retrievability for large files, in ACM Conf. Computer and Communications Security (CCS, Alexandria, Virginia, USA, 28-31 October, 2007), pp. 584-597.
-
(2007)
ACM Conf. Computer and Communications Security
, pp. 584-597
-
-
Juels Jr., A.B.S.K.1
-
23
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
CCS, Chicago, IL, USA 9-13 November
-
K. D. Bowers, A. Juels and A. Oprea, Hail: A high-availability and integrity layer for cloud storage, in ACM Conf. Computer and Communications Security (CCS, Chicago, IL, USA, 9-13 November, 2009), pp. 187-198.
-
(2009)
ACM Conf. Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
24
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Springer
-
Y. Dodis, S. P. Vadhan and D. Wichs, Proofs of retrievability via hardness amplification, in TCC (Springer, 2009), pp. 109-127.
-
(2009)
TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.P.2
Wichs, D.3
|