-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM Conference on Computer and Communications Security (CCS), pages 598-609, 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
7
-
-
0018480594
-
Decomposable searching problems
-
J. Bentley. Decomposable searching problems. Information Processing Letters, 8(5):244-251, 1979.
-
(1979)
Information Processing Letters
, vol.8
, Issue.5
, pp. 244-251
-
-
Bentley, J.1
-
11
-
-
51849117195
-
MR. PDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR. PDP: Multiple-replica provable data possession. In International Conference on Distributed Computing Systems (ICDCS), pages 411-420, 2008.
-
(2008)
International Conference on Distributed Computing Systems (ICDCS)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
12
-
-
84877976885
-
Interval trees
-
chapter 10.1 Springer-Verlag, second edition
-
M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Interval trees. In Computational Geometry, chapter 10.1, pages 212-217. Springer-Verlag, second edition, 2000.
-
(2000)
Computational Geometry
, pp. 212-217
-
-
De Berg, M.1
Van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
-
14
-
-
84877940151
-
Write off-loading: Practical power management for enterprise storage
-
N. Dushyanth, D. Austin, and R. Antony. Write off-loading: Practical power management for enterprise storage. Transactions on Storage, 4(3):10:1-10:23, 2008.
-
(2008)
Transactions on Storage
, vol.4
, Issue.3
-
-
Dushyanth, N.1
Austin, D.2
Antony, R.3
-
16
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In ACM Conference on Computer and Communications Security (CCS), pages 213-222, 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
17
-
-
56649103630
-
Athos: Efficient authentication of outsourced file systems
-
M. Goodrich, C. Papamanthou, R. Tamassia, and N. Triandopoulos. Athos: Efficient authentication of outsourced file systems. In International Conference on Information Security, pages 80-96, 2008.
-
(2008)
International Conference on Information Security
, pp. 80-96
-
-
Goodrich, M.1
Papamanthou, C.2
Tamassia, R.3
Triandopoulos, N.4
-
19
-
-
68149102542
-
Efficient integrity checking of untrusted network storage
-
A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia. Efficient integrity checking of untrusted network storage. In ACM International Workshop on Storage Security and Survivability (StorageSS), pages 43-54, 2008.
-
(2008)
ACM International Workshop on Storage Security and Survivability (StorageSS)
, pp. 43-54
-
-
Heitzmann, A.1
Palazzi, B.2
Papamanthou, C.3
Tamassia, R.4
-
21
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
A. Oprea and M. Reiter. Integrity checking in cryptographic file systems with constant trusted storage. In USENIX Security Symposium, pages 183-198, 2007.
-
(2007)
USENIX Security Symposium
, pp. 183-198
-
-
Oprea, A.1
Reiter, M.2
-
22
-
-
85032616916
-
Enabling security in cloud storage SLAs with CloudProof
-
R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with CloudProof. In USENIX Annual Technical Conference, pages 355-368, 2011.
-
(2011)
USENIX Annual Technical Conference
, pp. 355-368
-
-
Popa, R.1
Lorch, J.2
Molnar, D.3
Wang, H.4
Zhuang, L.5
-
23
-
-
0025436383
-
Skip lists. A probabilistic alternative to balanced trees
-
DOI 10.1145/78973.78977
-
W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Communications of the ACM, 33:668-676, 1990. (Pubitemid 21672422)
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
24
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-Belleste, Y. Deswarte, and J.-J. Quisquater. Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering (TKDE), 20(8):1034-1038, 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Belleste, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
26
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Ensuring data storage security in cloud computing. In International Workshop on Quality of Service, pages 1-9, 2009.
-
(2009)
International Workshop on Quality of Service
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
27
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In European Symposium on Research in Computer Security (ESORICS), pages 355-370, 2009.
-
(2009)
European Symposium on Research in Computer Security (ESORICS)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
28
-
-
79952020799
-
Bringing secure storage and computation in cloud
-
SecCloud
-
L. Wei, H. Zhu, Z. Cao, W. Jia, and A. Vasilakos. SecCloud: Bringing secure storage and computation in cloud. In ICDCSW, pages 52-61, 2010.
-
(2010)
ICDCSW
, pp. 52-61
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Jia, W.4
Vasilakos, A.5
|