-
2
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R.W. Yeung. Network Information Flow. IEEE Trans. on Information Theory, 46(4):1204-1216, Jul 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
84874337027
-
-
Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/.
-
-
-
-
4
-
-
84874323681
-
-
Amazon Simple Storage Service. http://aws.amazon.com/s3/.
-
-
-
-
5
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Communications of the ACM, 53(4):50-58, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
6
-
-
79959823910
-
Remote data checking using provable data possession
-
May
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song. Remote Data Checking Using Provable Data Possession. ACM Trans. on Information and System Security, 14:12:1-12:34, May 2011.
-
(2011)
ACM Trans. on Information and System Security
, vol.14
, pp. 121-1234
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
8
-
-
78650354388
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz. Proofs of Storage from Homomorphic Identification Protocols. In Proc. of ASIACRYPT, 2009.
-
(2009)
Proc. of ASIACRYPT
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
9
-
-
79955971286
-
DEPSKY: Dependable and secure storage in a cloud-of-clouds
-
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. In Proc. of ACM EuroSys, 2011.
-
(2011)
Proc. of ACM EuroSys
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
11
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Juels, and A. Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. In Proc. of ACM CCS, 2009.
-
(2009)
Proc. of ACM CCS
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
13
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns. Remote Data Checking for Network Coding-Based Distributed Storage Systems. In Proc. of ACM CCSW, 2010.
-
(2010)
Proc. of ACM CCSW
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
17
-
-
77955726417
-
Network coding for distributed storage systems
-
A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran. Network Coding for Distributed Storage Systems. IEEE Trans. on Information Theory, 56(9):4539-4551, 2010.
-
(2010)
IEEE Trans. on Information Theory
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.1
Godfrey, P.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
18
-
-
78650345904
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. Vadhan, and D. Wichs. Proofs of Retrievability via Hardness Amplification. In Proc. of TCC, 2009.
-
(2009)
Proc. of TCC
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
22
-
-
85077127142
-
NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
-
Y. Hu, H. Chen, P. Lee, and Y. Tang. NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds. In Proc. of USENIX FAST, 2012.
-
(2012)
Proc. of USENIX FAST
-
-
Hu, Y.1
Chen, H.2
Lee, P.3
Tang, Y.4
-
23
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels and B. Kaliski Jr. PORs: Proofs of Retrievability for Large Files. In Proc. of ACM CCS, 2007.
-
(2007)
Proc. of ACM CCS
-
-
Juels, A.1
Kaliski Jr., B.2
-
24
-
-
84874322470
-
-
OpenSSL. http://www.openssl.org/.
-
-
-
-
25
-
-
84874325024
-
-
OpenStack Object Storage. http://www.openstack.org/projects/storage/.
-
-
-
-
26
-
-
0031223146
-
A tutorial on reed-solomon coding for fault-tolerance in RAID-like systems
-
Sep
-
J. S. Plank. A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems. Software-Practice & Experience, 27(9):995-1012, Sep 1997.
-
(1997)
Software-Practice & Experience
, vol.27
, Issue.9
, pp. 995-1012
-
-
Plank, J.S.1
-
27
-
-
85032616916
-
Enabling security in cloud storage SLAs with CloudProof
-
R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang. Enabling Security in Cloud Storage SLAs with CloudProof. In Proc. of USENIX ATC, 2011.
-
(2011)
Proc. of USENIX ATC
-
-
Popa, R.1
Lorch, J.2
Molnar, D.3
Wang, H.4
Zhuang, L.5
-
28
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Apr
-
M. O. Rabin. Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM, 36(2):335-348, Apr 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
30
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
T. Schwarz and E. Miller. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. In Proc. of IEEE ICDCS, 2006.
-
(2006)
Proc. of IEEE ICDCS
-
-
Schwarz, T.1
Miller, E.2
-
33
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In Proc. of IEEE INFOCOM, 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
34
-
-
80155208638
-
-
Watson Hall Ltd. UK data retention requirements, 2009. https://www.watsonhall.com/resources/downloads/paper-uk-dataretention- requirements.pdf.
-
(2009)
UK Data Retention Requirements
-
-
-
35
-
-
84874289267
-
-
zfec
-
zfec. http://pypi.python.org/pypi/.
-
-
-
|