-
1
-
-
77950347409
-
A view of cloud computing
-
(Apr
-
A rmbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M. A view of cloud computing. Commun. ACM 53, 4 (Apr. 2010), 5058.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
(Alexandria, VA, Oct. 2831). ACM Press, New York
-
A teniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, VA, Oct. 2831). ACM Press, New York, 2007, 598609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
(Tokyo, Dec. 610). Springer
-
A teniese, G., Kamara, S., and Katz, J. Proofs of storage from homomorphic identification protocols. In Proceedings of the Conference on Advances in Cryptology Lecture Notes in Computer Science 5912 (Tokyo, Dec. 610). Springer, 2009, 319333.
-
(2009)
Proceedings of the Conference on Advances in Cryptology Lecture Notes in Computer Science
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
4
-
-
34748917584
-
A fresh look at the reliability of long-term digital storage
-
(Leuven, Belgium, Apr. 1821). ACM Press, New York, 221234
-
B aker, M., Shah, M., Rosenthal, D.S.H., Roussopoulos, M., Maniatis, P., Giuli, T., and Bungale, P. A fresh look at the reliability of long-term digital storage. In Proceedings of the European Conference on Computer Systems (Leuven, Belgium, Apr. 1821). ACM Press, New York, 2006, 221234.
-
(2006)
Proceedings of the European Conference on Computer Systems
-
-
Baker, M.1
Shah, M.2
Rosenthal, D.S.H.3
Roussopoulos, M.4
Maniatis, P.5
Giuli, T.6
Bungale, P.7
-
5
-
-
84866387591
-
Is security lost in the cloud
-
B lumenthal, M. Is security lost in the cloud Communications and Strategies 1, 81 (2011), 6986.
-
(2011)
Communications And Strategies
, vol.81
, Issue.1
, pp. 69-86
-
-
Blumenthal, M.1
-
6
-
-
74049144464
-
Hail: A highavailability and integrity layer for cloud storage
-
(Chicago, Nov. 913). ACM Press, New York, 187198
-
B owers, K.D., Juels, A., and Oprea, A. HAIL: A highavailability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (Chicago, Nov. 913). ACM Press, New York, 2009, 187198.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
7
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
(Chicago, Oct. 1721). ACM Press, New York
-
B owers, K.D., van Dijk, M., Juels, A., Oprea, A., and Rivest, R.L. How to tell if your cloud files are vulnerable to drive crashes. In Proceedings of the 18th ACM Conference on Computer and Communications Security (Chicago, Oct. 1721). ACM Press, New York, 2011, 501514.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 501-514
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
8
-
-
74049121230
-
-
Dynamic Provable Data Possession ACM Press, New York
-
E rway, C., Kupcu, A., Papamanthou, C., and Tamassia, R. Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security (Chicago, Nov. 913). ACM Press, New York, 2009, 213222.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (Chicago, Nov. 913
, pp. 213222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
9
-
-
84873680094
-
-
European Parliament. Directive 95/46/EC of the European Parliament of the Council (Data Protection Directive)
-
E uropean Parliament. Directive 95/46/EC of the European Parliament of the Council (Data Protection Directive), 1995; http://bit.ly/5eLDdi
-
(1995)
-
-
-
10
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
(Mar
-
G entry, C. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (Mar. 2010), 97105.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
11
-
-
84873638307
-
Google confirms problems with reaching its services
-
May 14
-
H elft, M. Google confirms problems with reaching its services. The New York Times (May 14, 2009); http://www.developmentguruji.com/news/99/ Googleconfirms-problems-with-reaching-its-services.html
-
(2009)
The New York Times
-
-
Helft, M.1
-
12
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
(Alexandria, VA, Oct. 2831). ACM Press, New York
-
J uels, A. and Kaliski, B. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, VA, Oct. 2831). ACM Press, New York, 2007, 584597.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584597
-
-
Juels, A.1
Kaliski, B.2
-
13
-
-
77956137294
-
Cryptographic cloud storage
-
(Tenerife, Canary Islands, Spain, Jan. 2528). Springer
-
Kamara, S. and Lauter, K. Cryptographic cloud storage. In Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, Lecture Notes in Computer Science 6054 (Tenerife, Canary Islands, Spain, Jan. 2528). Springer, 2010, 136149.
-
(2010)
Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, Lecture Notes in Computer Science 6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
14
-
-
84865472153
-
-
Technical Report MSR-TR-2011-58. Microsoft, Redmond, WA
-
Kamara, S., Papamanthou, C., and Roeder, T. Cs2: A Searchable Cryptographic Cloud Storage System. Technical Report MSR-TR-2011-58. Microsoft, Redmond, WA, 2011.
-
(2011)
Cs2: A Searchable Cryptographic Cloud Storage System.
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
15
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
(Boston, Aug. 610). USENIX Association, Berkeley, CA, 183198
-
O prea, A. and Reiter, M.K. Integrity checking in cryptographic file systems with constant trusted storage. In Proceedings of the 16th Usenix Security Symposium (Boston, Aug. 610). USENIX Association, Berkeley, CA, 2007, 183198.
-
(2007)
Proceedings of the 16th Usenix Security Symposium
-
-
Oprea, A.1
Reiter, M.K.2
-
16
-
-
84944041103
-
A case for redundant arrays of inexpensive disks (raid
-
Sept.
-
Patterson, D., Gibson, G., and Katz, R. A case for redundant arrays of inexpensive disks (RAID). SIGMOD Record 17, 3 (Sept. 1988), 109116.
-
(1988)
SIGMOD Record
, vol.17
, Issue.3
, pp. 109-116
-
-
Patterson, D.1
Gibson, G.2
Katz, R.3
-
17
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
(Cascais, Portugal, Oct. 2326). ACM Press, New York
-
Popa, R.A., Redfield, C.M.S., Zeldovich, N., and Balakrishnan, H. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (Cascais, Portugal, Oct. 2326). ACM Press, New York, 2011, 85100.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
18
-
-
74049152260
-
Hey you get off of my cloud: Exploring information leakage in third-party compute clouds
-
(Chicago, Nov 913). ACM Press, New York, 199212
-
R istenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (Chicago, Nov 913). ACM Press, New York, 2009, 199212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
19
-
-
85084160707
-
Disk failures in the real world: What does an mtf of 1, 000000 hours mean to you
-
(San Jose CA Feb 1316) USENIX Association Berkeley CA
-
S chroeder, B. and Gibson, G. Disk failures in the real world: What does an MTF of 1,000,000 hours mean to you In Proceedings of the Fifth USENIX Conference on File and Storage Technologies (San Jose, CA, Feb. 1316). USENIX Association, Berkeley, CA, 2007, 116.
-
(2007)
Proceedings of the Fifth USENIX Conference on File and Storage Technologies
, pp. 1-16
-
-
Schroeder, B.1
Gibson, G.2
-
20
-
-
84872103252
-
Iris: A scalable cloud file system with efficient integrity checks
-
(Orlando, FL, Dec. 37
-
S tefanov, E., van Dijk, M., Oprea, A., and Juels, A. Iris: A scalable cloud file system with efficient integrity checks. In Proceedings of the 28th Annual Computer Security Applications Conference (Orlando, FL, Dec. 37, 2012).
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference
-
-
Stefanov, E.1
Van Dijk, M.2
Oprea, A.3
Juels, A.4
-
21
-
-
84873636499
-
Update from amazon regarding friday s3 downtime
-
Feb. 16
-
S tern, A. Update from Amazon regarding Friday S3 downtime. CenterNetworks, Feb. 16, 2008; http://www.centernetworks.com/amazon-s3- downtimeupdate
-
(2008)
CenterNetworks
-
-
Stern, A.1
-
22
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
(Washington, D.C., Aug. 1113). USENIX Association, Berkeley, CA
-
van Dijk, M. and Juels, A. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the HOTSEC Workshop on Hot Topics in Security (Washington, D.C., Aug. 1113). USENIX Association, Berkeley, CA, 2010.
-
(2010)
Proceedings of the HOTSEC Workshop on Hot Topics in Security
-
-
Van Dijk, M.1
Juels, A.2
-
23
-
-
84928350817
-
Microsoft t-mobile stumble with sidekick glitch
-
Oct. 11
-
W ingfield, N. Microsoft, T-Mobile stumble with Sidekick glitch. The Wall Street Journal (Oct. 11, 2009); http://online.wsj.com/article/SB100014240527 48703790404574467431941990194.html
-
(2009)
The Wall Street Journal
-
-
W. Ingfield, N.1
-
24
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
(Berkeley, CA, May 2225). IE Computer Society Press
-
Z hang, Y., Juels, A., Oprea, A., and Reiter, M.K. HomeAlone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the IEEE Symposium on Security and Privacy (Berkeley, CA, May 2225). IE Computer Society Press, 2011, 313328.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|