-
1
-
-
84872112212
-
-
Full version, http://eprint.iacr.org/2011/585.pdf.
-
Full Version
-
-
-
2
-
-
84872101509
-
-
IOzone filesystem benchmark. www.iozone.org. 2011.
-
(2011)
-
-
-
3
-
-
84872110945
-
-
www.memcached.org.
-
-
-
-
4
-
-
10444279524
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. Usenix, 2002.
-
(2002)
Usenix
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In 14th ACM CCS, pages 598-609, 2007.
-
(2007)
14th ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
10
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
volume 5444 of LNCS
-
Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In Proc. 6th IACR TCC, volume 5444 of LNCS, pages 109-127, 2009.
-
(2009)
Proc. 6th IACR TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
0346739133
-
Fast and secure distributed read-only file system
-
DOI 10.1145/505452.505453
-
K. Fu, F. Kaashoek, and D. Mazieres. Fast and secure distributed read-only file system. ACM Transactions on Computer Systems, 20:1-24, 2002. (Pubitemid 135707562)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazieres, D.3
-
15
-
-
79955951203
-
Keypad: An auditing file system for theft-prone devices
-
R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy. Keypad: An auditing file system for theft-prone devices. In Proc. European Conference on Computer Systems (EuroSys), 2011.
-
(2011)
Proc. European Conference on Computer Systems (EuroSys)
-
-
Geambasu, R.1
John, J.P.2
Gribble, S.D.3
Kohno, T.4
Levy, H.M.5
-
16
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proc. Network and Distributed Systems Security Symposium (NDSS 2003), pages 131-145, 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium (NDSS 2003)
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
19
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. 2nd USENIX Conference on File and Storage Technologies (FAST), 2003.
-
(2003)
Proc. 2nd USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
21
-
-
77952379905
-
Secure untrusted data repository
-
Usenix
-
J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure untrusted data repository. In Proc. 6th Symposium on Operating System Design and Implementation (OSDI), pages 121-136. Usenix, 2004.
-
(2004)
Proc. 6th Symposium on Operating System Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazieres, D.3
Shasha, D.4
-
22
-
-
79955969463
-
Depot: Cloud storage with minimal trust
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In Proc. OSDI, 2010.
-
(2010)
Proc. OSDI
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
24
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
A. Oprea and M. K. Reiter. Integrity checking in cryptographic file systems with constant trusted storage. In Proc. Usenix Security Symposium 2007, 2007.
-
(2007)
Proc. Usenix Security Symposium 2007
-
-
Oprea, A.1
Reiter, M.K.2
-
26
-
-
85032616916
-
Enabling security in cloud storage SLAs with CloudProof
-
R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with CloudProof. In Proc. 2011 USENIX Annual Technical Conference (USENIX), 2011.
-
(2011)
Proc. 2011 USENIX Annual Technical Conference (USENIX)
-
-
Popa, R.A.1
Lorch, J.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
27
-
-
58349118819
-
Compact proofs of retrievability
-
volume 5350 of LNCS
-
H. Shacham and B. Waters. Compact proofs of retrievability. In Proc. ASIACRYPT, volume 5350 of LNCS, pages 90-107, 2008.
-
(2008)
Proc. ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
28
-
-
78650085550
-
Venus: Verification for untrusted cloud storage
-
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. Venus: Verification for untrusted cloud storage. In Proc. Workshop on Cloud Computing Security., 2010.
-
(2010)
Proc. Workshop on Cloud Computing Security
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
30
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In Proc. 14th European Symposium on Research in Computer Security (ESORICS 2009), 2009.
-
(2009)
Proc. 14th European Symposium on Research in Computer Security (ESORICS 2009)
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|