-
1
-
-
67650346359
-
Tahoe: The least-authority filesystem
-
Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-authority filesystem," in StorageSS, 2008, pp. 21-26.
-
(2008)
StorageSS
, pp. 21-26
-
-
Wilcox-O'Hearn, Z.1
Warner, B.2
-
2
-
-
74049144464
-
HAIL: A High-Availability and Integrity Layer for Cloud Storage
-
ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," in 16th ACM Conference on Computer and Communications Security, CCS '09. ACM, 2009, pp. 187-198.
-
(2009)
16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
3
-
-
85032616916
-
Enabling Security in Cloud Storage SLAs with CloudProof
-
R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof," in USENIX Annual Technical Conference (USENIX), 2011.
-
USENIX Annual Technical Conference (USENIX), 2011
-
-
Popa, R.A.1
Lorch, J.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
4
-
-
78650085550
-
Venus: Verification for untrusted cloud storage
-
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket, "Venus: verification for untrusted cloud storage," in CCSW, 2010, pp. 19-30.
-
(2010)
CCSW
, pp. 19-30
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
5
-
-
77954899284
-
Racs: A case for cloud storage diversity
-
H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "Racs: a case for cloud storage diversity," in 1st ACM Symposium on Cloud Computing, SoCC 2010, 2010, pp. 229-240.
-
(2010)
1st ACM Symposium on Cloud Computing, SoCC 2010
, pp. 229-240
-
-
Abu-Libdeh, H.1
Princehouse, L.2
Weatherspoon, H.3
-
6
-
-
84872103252
-
Iris: A scalable cloud file system with efficient integrity checks
-
ACM
-
E. Stefanov, M. van Dijk, A. Oprea, and A. Juels, "Iris: A scalable cloud file system with efficient integrity checks," in 28th Annual Computer Security Applications Conference (ACSAC 2012). ACM, 2012.
-
(2012)
28th Annual Computer Security Applications Conference (ACSAC 2012)
-
-
Stefanov, E.1
Van Dijk, M.2
Oprea, A.3
Juels, A.4
-
7
-
-
79955971286
-
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
-
A. N. Bessani, M. P. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and Secure Storage in a Cloud-of-Clouds," in EuroSys, 2011, pp. 31-46.
-
(2011)
EuroSys
, pp. 31-46
-
-
Bessani, A.N.1
Correia, M.P.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
8
-
-
84865472153
-
-
Microsoft Research, Tech. Rep. MSR-TR-2011-58
-
S. Kamara, C. Papamanthou, and T. Roeder, "CS2: A Searchable Cryptographic Cloud Storage System," Microsoft Research, Tech. Rep. MSR-TR-2011-58, 2011.
-
(2011)
CS2: A Searchable Cryptographic Cloud Storage System
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
9
-
-
85077023955
-
AONT-RS: Blending Security and Performance in Dispersed Storage Systems
-
J. K. Resch and J. S. Plank, "AONT-RS: Blending Security and Performance in Dispersed Storage Systems," in FAST, 2011, pp. 191-202.
-
(2011)
FAST
, pp. 191-202
-
-
Resch, J.K.1
Plank, J.S.2
-
10
-
-
84856343948
-
Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users
-
J. Spillner, G. Bombach, S. Matthischke, J. Muller, R. Tzschichholz, and A. Schill, "Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users," in UCC, 2011, pp. 1-8.
-
(2011)
UCC
, pp. 1-8
-
-
Spillner, J.1
Bombach, G.2
Matthischke, S.3
Muller, J.4
Tzschichholz, R.5
Schill, A.6
-
11
-
-
84866635679
-
Robust Data Sharing with Key-Value Stores
-
IEEE
-
C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolic, and I. Zachevsky, "Robust Data Sharing with Key-Value Stores," in Intl. Conference on Dependable Systems and Networks (DSN). IEEE, 2012.
-
(2012)
Intl. Conference on Dependable Systems and Networks (DSN)
-
-
Basescu, C.1
Cachin, C.2
Eyal, I.3
Haas, R.4
Sorniotti, A.5
Vukolic, M.6
Zachevsky, I.7
-
12
-
-
84876187832
-
-
Nov. 20
-
Amazon Outage, http://www.networkworld.com/news/2012/042712-amazon- outage-258735.htmll, Nov. 20. 2012.
-
(2012)
Amazon Outage
-
-
-
13
-
-
84876185361
-
-
Nov. 20
-
Sidekick, http://abcnews.go.com/Business/sidekick-disaster-shows-datas- safe-cloud/story?id=8840420, Nov. 20. 2012.
-
(2012)
Sidekick
-
-
-
14
-
-
84957626176
-
Proactive Secret Sharing Or: How to Cope with Perpetual Leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," in CRYPTO, 1995, pp. 339-352.
-
(1995)
CRYPTO
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0023538330
-
A Practical Scheme for Non-interactive Verifiable Secret Sharing
-
P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in FOCS, 1987, pp. 427-437.
-
(1987)
FOCS
, pp. 427-437
-
-
Feldman, P.1
-
17
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
18
-
-
85028775022
-
Secret sharing made short
-
H. Krawczyk, "Secret sharing made short," in CRYPTO, 1993, pp. 136-146.
-
(1993)
CRYPTO
, pp. 136-146
-
-
Krawczyk, H.1
-
20
-
-
84947912552
-
All-or-Nothing Encryption and the Package Transform
-
R. L. Rivest, "All-or-Nothing Encryption and the Package Transform," in Fast Software Encryption (FSE '97), 1997, pp. 210-218.
-
(1997)
Fast Software Encryption (FSE '97)
, pp. 210-218
-
-
Rivest, R.L.1
-
22
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," in FAST, 2003.
-
(2003)
FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
23
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, "Provable data possession at untrusted stores," in ACM Conference on Computer and Communications Security, 2007, pp. 598-609.
-
ACM Conference on Computer and Communications Security, 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
24
-
-
33645240198
-
The free haven project: Distributed anonymous storage service
-
R. Dingledine, M. J. Freedman, and D. Molnar, "The free haven project: Distributed anonymous storage service," in Workshop on Design Issues in Anonymity and Unobservability, 2000, pp. 67-95.
-
Workshop on Design Issues in Anonymity and Unobservability, 2000
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
25
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant web publishing system
-
M. Waldman, A. D. Rubin, and L. F. Cranor, "Publius: A robust, tamper-evident, censorship-resistant web publishing system," in Usenix Security Symposium, 2000.
-
Usenix Security Symposium, 2000
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
26
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems
-
Springer-Verlag New York, Inc.
-
J.-F. Raymond, "Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems," in Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag New York, Inc., 2001, pp. 10-29.
-
(2001)
Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability
, pp. 10-29
-
-
Raymond, J.-F.1
-
27
-
-
84857773390
-
Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources
-
in Selected Areas in Cryptography (SAC 2011), ser.
-
D. Slamanig, "Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources," in Selected Areas in Cryptography (SAC 2011), ser. LNCS, vol. 7118, 2011, pp. 73-91.
-
(2011)
LNCS
, vol.7118
, pp. 73-91
-
-
Slamanig, D.1
-
28
-
-
84865500708
-
(More) Side Channels in Cloud Storage: Linking Data to Users
-
in Privacy and Identity Management for Life, ser.
-
T. Pulls, "(More) Side Channels in Cloud Storage: Linking Data to Users," in Privacy and Identity Management for Life, ser. AICT, vol. 375, 2012, pp. 102-115.
-
(2012)
AICT
, vol.375
, pp. 102-115
-
-
Pulls, T.1
-
29
-
-
84868352690
-
Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool
-
in 17th Nordic Conference on Secure IT Systems (NordSec 2012), ser.
-
-, "Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool," in 17th Nordic Conference on Secure IT Systems (NordSec 2012), ser. LNCS, 2012.
-
(2012)
LNCS
-
-
Pulls, T.1
-
30
-
-
77954327465
-
-
University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5
-
Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5, 2010.
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
31
-
-
84857078897
-
Oblivious Outsourced Storage with Delegation
-
M. Franz, P. Williams, B. Carbunar, S. Katzenbeisser, A. Peter, R. Sion, and M. Sotáková, "Oblivious Outsourced Storage with Delegation," in Financial Cryptography, 2011, pp. 127-140.
-
(2011)
Financial Cryptography
, pp. 127-140
-
-
Franz, M.1
Williams, P.2
Carbunar, B.3
Katzenbeisser, S.4
Peter, A.5
Sion, R.6
Sotáková, M.7
-
32
-
-
84865805438
-
Privacy Enhanced Access Control for Outsourced Data Sharing
-
in Financial Cryptography and Data Security, ser. Springer
-
M. Raykova, H. Zhao, and S. Bellovin, "Privacy Enhanced Access Control for Outsourced Data Sharing," in Financial Cryptography and Data Security, ser. LNCS. Springer, 2012.
-
(2012)
LNCS
-
-
Raykova, M.1
Zhao, H.2
Bellovin, S.3
-
33
-
-
84865830228
-
Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access
-
in Financial Cryptography and Data Security, ser. Springer
-
D. Slamanig, "Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access," in Financial Cryptography and Data Security, ser. LNCS. Springer, 2012.
-
(2012)
LNCS
-
-
Slamanig, D.1
-
34
-
-
74049137084
-
Oblivious Transfer with Access Control
-
ACM
-
J. Camenisch, M. Dubovitskaya, and G. Neven, "Oblivious Transfer with Access Control," in ACM Conference on Computer and Communications Security. ACM, 2009, pp. 131-140.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
35
-
-
79952510570
-
Oblivious Transfer with Hidden Access Control Policies
-
in Public Key Cryptography, ser. Springer
-
J. Camenisch, M. Dubovitskaya, G. Neven, and G. M. Zaverucha, "Oblivious Transfer with Hidden Access Control Policies," in Public Key Cryptography, ser. LNCS, vol. 6571. Springer, 2011, pp. 192-209.
-
(2011)
LNCS
, vol.6571
, pp. 192-209
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
Zaverucha, G.M.4
-
36
-
-
79959823641
-
Access Controls for Oblivious and Anonymous Systems
-
S. E. Coull, M. Green, and S. Hohenberger, "Access Controls for Oblivious and Anonymous Systems," ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, p. 10, 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
, pp. 10
-
-
Coull, S.E.1
Green, M.2
Hohenberger, S.3
|