-
1
-
-
68249129760
-
-
University of California, Berkeley
-
Armbrust, M., F. Armando, R. Griffith, D. Anthony and R. Joseph et al., 2009. Above the clouds: A Berkeley view of cloud computing. University of California, Berkeley.
-
(2009)
Above the clouds: A Berkeley view of cloud computing
-
-
Armbrust, M.1
Armando, F.2
Griffith, R.3
Anthony, D.4
Joseph, R.5
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Oct. 28-31, ACM Press, New York. DOI: 10.1145/1315245.1315318
-
Ateniese, G., R. Burns, R. Curtmola, J. Herring and L. Kissner et al., 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Oct. 28-31, ACM Press, New York, pp: 598-609. DOI: 10.1145/1315245.1315318
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
-
4
-
-
57049134700
-
Remote integrity check with dishonest storage server
-
DOI: 10.1007/978-3-540-88313-5_15
-
Chang, E.C. and J. Xu, 2008. Remote integrity check with dishonest storage server. Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, (ESORICS' 08), ACM Press, Heidelberg, pp: 223-237. DOI: 10.1007/978-3-540-88313-5_15
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, (ESORICS' 08), ACM Press, Heidelberg
, pp. 223-237
-
-
Chang, E.C.1
Xu, J.2
-
5
-
-
74349113474
-
On technical security issues in cloud computing
-
(CLOUD-II 2009), Sept. 21-25, IEEE Xplore Press, Bangalore. DOI: 10.1109/CLOUD.2009.60
-
Jensen, M., J. Schwenk, N. Gruschka and L.L. Iacono, 2009. On technical security issues in cloud computing. Proceedings of the IEEE International Conference on Cloud Computing, (CLOUD-II 2009), Sept. 21-25, IEEE Xplore Press, Bangalore, pp: 109-116. DOI: 10.1109/CLOUD.2009.60
-
(2009)
Proceedings of the IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
6
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
(CCS' 07), ACM Press, New York. DOI: 10.1145/1315245.1315317
-
Juels, A. and B.S. Kaliski, 2007. Pors: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, (CCS' 07), ACM Press, New York, pp: 584-597. DOI: 10.1145/1315245.1315317
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
7
-
-
79952020799
-
SecCloud: Bridging secure storage and computation in cloud
-
Jun., 21-25, IEEE Xplore Press, Genova. DOI: 10.1109/ICDCSW.2010.36
-
Lifei, W., H. Zhu, C. Zhenfu and W. Jia, 2010. SecCloud: Bridging secure storage and computation in cloud. Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Jun., 21-25, IEEE Xplore Press, Genova, pp: 52-61. DOI: 10.1109/ICDCSW.2010.36
-
(2010)
Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
, pp. 52-61
-
-
Lifei, W.1
Zhu, H.2
Zhenfu, C.3
Jia, W.4
-
9
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
(CLOUD' 09), ACM Press, USA. DOI: 10.1109/CLOUD.2009.5071532
-
Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, (CLOUD' 09), ACM Press, USA., pp: 44-52. DOI: 10.1109/CLOUD.2009.5071532
-
(2009)
Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing
, pp. 44-52
-
-
Pearson, S.1
-
10
-
-
58349118819
-
Compact proofs of retrievability
-
(ASIACRYPT' 08), ACM Press, Heidelberg. DOI: 10.1007/978-3-540-89255-7_7
-
Shacham, H. and B. Waters, 2008. Compact proofs of retrievability. Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (ASIACRYPT' 08), ACM Press, Heidelberg, pp: 90-107. DOI: 10.1007/978-3-540-89255-7_7
-
(2008)
Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
12
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Jul. 13-15, IEEE Xplore Press, Charleston, SC. DOI: 10.1109/IWQoS.2009.5201385
-
Wang, C., Q. Wang, K. Ren and W. Lou, 2009a. Ensuring data storage security in cloud computing. Proceedings of the17th International Workshop on Quality of Service, Jul. 13-15, IEEE Xplore Press, Charleston, SC., pp: 1-9. DOI: 10.1109/IWQoS.2009.5201385
-
(2009)
Proceedings of the17th International Workshop on Quality of Service
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
13
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
(ESORICS' 09), ACM Press, Heidelberg, pp
-
Wang, Q., C. Wang, J. Li, K. Ren and W. Lou, 2009b. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of the 14th European Conference on Research in Computer Security, (ESORICS' 09), ACM Press, Heidelberg, pp: 355-370.
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
14
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
DOI: 10.1109/TPDS.2010.183
-
Wang, Q., C. Wang, J. Li, K. Ren and W. Lou, 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parall. Distrib. Syst., 22: 847-858. DOI: 10.1109/TPDS.2010.183
-
(2011)
IEEE Trans. Parall. Distrib. Syst.
, vol.22
, pp. 847-858
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|