-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. Provable data possession at untrusted stores. In ACM CCS, pages 598-609, 2007.
-
(2007)
ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
2
-
-
84921018856
-
A practical and provably secure coalition resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition resistant group signature scheme. In CRYPTO, pages 255-270, 2000.
-
(2000)
CRYPTO
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In ACM CCS, pages 187-198, 2009.
-
(2009)
ACM CCS
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
5
-
-
78751672541
-
Integrity and consistency for untrusted services
-
C. Cachin. Integrity and consistency for untrusted services. In SOFSEM, pages 1-14, 2011.
-
(2011)
SOFSEM
, pp. 1-14
-
-
Cachin, C.1
-
6
-
-
70449984096
-
Fail-aware untrusted storage
-
C. Cachin, I. Keidar, and A. Shraer. Fail-aware untrusted storage. In DSN, pages 494-503, 2009.
-
(2009)
DSN
, pp. 494-503
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
7
-
-
59249102694
-
Attested append-only memory: Making adversaries stick to their word
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: making adversaries stick to their word. In SOSP, pages 189-204, 2007.
-
(2007)
SOSP
, pp. 189-204
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
8
-
-
74049121230
-
Dynamic provable data possession
-
C. C. Erway, A. Küpçu ̈, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In ACM CCS, pages 213-222, 2009.
-
(2009)
ACM CCS
, pp. 213-222
-
-
Erway, C.C.1
Küpçü, C.2
Papamanthou, C.3
Tamassia, R.4
-
9
-
-
84991960975
-
SPORC: Group collaboration using untrusted cloud resources
-
A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. SPORC: Group collaboration using untrusted cloud resources. In OSDI, pages 337-350, 2010.
-
(2010)
OSDI
, pp. 337-350
-
-
Feldman, A.J.1
Zeller, W.P.2
Freedman, M.J.3
Felten, E.W.4
-
10
-
-
79957885122
-
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
-
J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su. Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. In Proc. IEEE Consumer Communications and Networking Conference (CCNC), pages 521-522, 2011.
-
(2011)
Proc. IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 521-522
-
-
Feng, J.1
Chen, Y.2
Summerville, D.3
Ku, W.-S.4
Su, Z.5
-
11
-
-
84869401018
-
Practical oblivious storage
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Practical oblivious storage. In ACM CODASPY, pages 13-24, 2012.
-
(2012)
ACM CODASPY
, pp. 13-24
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
13
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels and B. S. Kaliski, Jr. PORs: Proofs of retrievability for large files. In ACM CCS, pages 584-597, 2007.
-
(2007)
ACM CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
15
-
-
85076877909
-
TrInc: Small trusted hardware for large distributed systems
-
D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small trusted hardware for large distributed systems. In NSDI, pages 1-14, 2009.
-
(2009)
NSDI
, pp. 1-14
-
-
Levin, D.1
Douceur, J.R.2
Lorch, J.R.3
Moscibroda, T.4
-
16
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, pages 121-136, 2004.
-
(2004)
OSDI
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Mazières, D.3
Shasha, D.4
-
17
-
-
85094320125
-
Beyond one-third faulty replicas in Byzantine fault tolerant systems
-
J. Li and D. Mazières. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In NSDI, 2007.
-
(2007)
NSDI
-
-
Li, J.1
Mazières, D.2
-
18
-
-
85076918673
-
Depot: Cloud storage with minimal trust
-
P. Mahajan, S. T. V. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In OSDI, pages 307-322, 2010.
-
(2010)
OSDI
, pp. 307-322
-
-
Mahajan, P.1
Setty, S.T.V.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
20
-
-
0036953818
-
Building secure file systems out of Byzantine storage
-
D. Mazières and D. Shasha. Building secure file systems out of Byzantine storage. In ACM PODC, pages 108-117, 2002.
-
(2002)
ACM PODC
, pp. 108-117
-
-
Mazières, D.1
Shasha, D.2
-
21
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. D. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, pages 143-158, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
22
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, pages 315-328, 2008.
-
(2008)
EuroSys
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
23
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, pages 369-378, 1987.
-
(1987)
CRYPTO
, pp. 369-378
-
-
Merkle, R.C.1
-
24
-
-
77950901995
-
Scalable web content attestation
-
T. Moyer, K. Butler, J. Schiffman, P. McDaniel, and T. Jaeger. Scalable web content attestation. In ACSAC, pages 95-104, 2009.
-
(2009)
ACSAC
, pp. 95-104
-
-
Moyer, T.1
Butler, K.2
Schiffman, J.3
McDaniel, P.4
Jaeger, T.5
-
25
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
L. F. G. Sarmenta, M. v. Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In Proceedings of the First ACM Workshop on Scalable Trusted Computing, pages 27-42, 2006.
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
Dijk, M.V.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
26
-
-
58349118819
-
Compact proofs of retrievability
-
H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90-107, 2008.
-
(2008)
ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
27
-
-
78650085550
-
Venus: Verification for untrusted cloud storage
-
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. Venus: verification for untrusted cloud storage. In CCSW, pages 19-30, 2010.
-
(2010)
CCSW
, pp. 19-30
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
28
-
-
84866397408
-
Iris: A scalable cloud file system with efficient integrity checks
-
E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A scalable cloud file system with efficient integrity checks. IACR Cryptology ePrint Archive, 2011, 2011.
-
(2011)
IACR Cryptology EPrint Archive, 2011
-
-
Stefanov, E.1
Van Dijk, M.2
Oprea, A.3
Juels, A.4
-
32
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
M. van Dijk, J. Rhodes, L. F. G. Sarmenta, and S. Devadas. Offline untrusted storage with immediate detection of forking and replay attacks. In Workshop on Scalable Trusted Computing, pages 41-48, 2007.
-
(2007)
Workshop on Scalable Trusted Computing
, pp. 41-48
-
-
Van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
Devadas, S.4
-
33
-
-
79959547649
-
Proof of freshness: How to efficiently use an online single secure clock to secure shared untrusted memory
-
MIT
-
M. van Dijk, L. Sarmenta, C. O'Donnell, and S. Devadas. Proof of freshness: How to efficiently use an online single secure clock to secure shared untrusted memory. Technical Report CSG Memo 496, MIT, 2006.
-
(2006)
Technical Report CSG Memo
, vol.496
-
-
Van Dijk, M.1
Sarmenta, L.2
O'Donnell, C.3
Devadas, S.4
-
34
-
-
84884706447
-
Towards end-to-end secure content storage and delivery with public cloud
-
H. Xiong, X. Zhang, D. Yao, X. Wu, and Y. Wen. Towards end-to-end secure content storage and delivery with public cloud. In ACM CODASPY, pages 257-266, 2012.
-
(2012)
ACM CODASPY
, pp. 257-266
-
-
Xiong, H.1
Zhang, X.2
Yao, D.3
Wu, X.4
Wen, Y.5
-
35
-
-
79952791500
-
Fair and dynamic proofs of retrievability
-
Q. Zheng and S. Xu. Fair and dynamic proofs of retrievability. In ACM CODASPY, pages 237-248, 2011.
-
(2011)
ACM CODASPY
, pp. 237-248
-
-
Zheng, Q.1
Xu, S.2
|