-
2
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Comm. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M.N. Krohn, D. Maziéres, and D. Shasha, "Secure Untrusted Data Repository (SUNDR)," Proc. Sixth Conf. Symp. Operating Systems Design Implementation, pp. 121-136, 2004.
-
(2004)
Proc. Sixth Conf. Symp. Operating Systems Design Implementation
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Maziéres, D.3
Shasha, D.4
-
5
-
-
4544293523
-
Efficient byzantine-tolerant erasure-coded storage
-
G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter, "Efficient Byzantine-Tolerant Erasure-Coded Storage," Proc. Int'l Conf. Dependable Systems and Networks, pp. 135-144, 2004.
-
(2004)
Proc. Int'l Conf. Dependable Systems and Networks
, pp. 135-144
-
-
Goodson, G.R.1
Wylie, J.J.2
Ganger, G.R.3
Reiter, M.K.4
-
6
-
-
33244454312
-
Securing distributed storage: Challenges, techniques, and systems
-
DOI 10.1145/1103780.1103783, StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
-
V. Kher and Y. Kim, "Securing Distributed Storage: Challenges, Techniques, and Systems," Proc. ACM Workshop Storage Security and Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik, L. Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005. (Pubitemid 43275368)
-
(2005)
StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 9-25
-
-
Kher, V.1
Kim, Y.2
-
7
-
-
36348936759
-
An analysis of latent sector errors in disk drives
-
DOI 10.1145/1269899.1254917, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
L.N. Bairavasundaram, G.R. Goodson, S. Pasupathy, and J. Schindler, "An Analysis of Latent Sector Errors in Disk Drives," Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems, L. Golubchik, M.H. Ammar, and M. Harchol- Balter, eds., pp. 289-300, 2007. (Pubitemid 350158092)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 289-300
-
-
Bairavasundaram, L.N.1
Goodson, G.R.2
Pasupathy, S.3
Schindler, J.4
-
8
-
-
85084160707
-
Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You?"
-
B. Schroeder and G.A. Gibson, "Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You?" Proc. USENIX Conf. File and Storage Technologies, pp. 1-16, 2007.
-
(2007)
Proc. USENIX Conf. File and Storage Technologies
, pp. 1-16
-
-
Schroeder, B.1
Gibson, G.A.2
-
9
-
-
85077532807
-
A cooperative internet backup scheme
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, "A Cooperative Internet Backup Scheme," Proc. USENIX Ann. Technical Conf., pp. 29-41, 2003.
-
(2003)
Proc. USENIX Ann. Technical Conf.
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
11
-
-
60349120237
-
The complexity of online memory checking
-
article 2
-
M. Naor and G.N. Rothblum, "The Complexity of Online Memory Checking," J. ACM, vol. 56, no. 1, article 2, 2009.
-
(2009)
J. ACM
, vol.56
, Issue.1
-
-
Naor, M.1
Rothblum, G.N.2
-
12
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds.
-
A. Juels and B.S. Kaliski Jr., "Pors: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Comm. Security, P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 584-597, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
13
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
T.J.E. Schwarz and E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Proc. 26th IEEE Int'l Conf. Distributed Computing Systems, p. 12, 2006.
-
(2006)
Proc. 26th IEEE Int'l Conf. Distributed Computing Systems
, pp. 12
-
-
Schwarz, T.J.E.1
Miller, E.L.2
-
14
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer," IACR Cryptology ePrint Archive, vol. 2006, p. 150, 2006.
-
(2006)
IACR Cryptology EPrint Archive
, vol.2006
, pp. 150
-
-
Filho, D.L.G.1
Barreto, P.S.L.M.2
-
15
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug
-
F. Sebé, J. Domingo-Ferrer, A. Marti'nez-Ballesté, Y. Deswarte, and J.-J. Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures," IEEE Trans. Knowledge Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowledge Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Marti'Nez-Ballesté, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
16
-
-
57049165488
-
Fast integrity for large data
-
June
-
G. Yamamoto, S. Oda, and K. Aoki, "Fast Integrity for Large Data," Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, pp. 21-32, June 2007.
-
(2007)
Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption
, pp. 21-32
-
-
Yamamoto, G.1
Oda, S.2
Aoki, K.3
-
17
-
-
85016272824
-
Auditing to keep online storage services honest
-
G.C. Hunt, ed.
-
M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS), G.C. Hunt, ed., 2007.
-
(2007)
Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS)
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
18
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
July/Aug
-
C. Wang, K. Ren, W. Lou, and J. Li, "Toward Publicly Auditable Secure Cloud Data Storage Services," IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
19
-
-
84858284080
-
Data storage auditing service in cloud computing: Challenges, methods and opportunities
-
K. Yang and X. Jia, "Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
20
-
-
74049102823
-
Provable data possession at untrusted stores
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds.
-
G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J. Peterson, and D.X. Song, "Provable Data Possession at Untrusted Stores," Proc. ACM Conf. Computer and Comm. Security, P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 598-609, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
21
-
-
58349118819
-
Compact proofs of retrievability
-
J. Pieprzyk, ed.
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability," Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, J. Pieprzyk, ed., pp. 90-107, 2008.
-
(2008)
Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
22
-
-
74049121230
-
Dynamic provable data possession
-
E. Al-Shaer, S. Jha, and A.D. Keromytis, eds.
-
C.C. Erway, A. Ku? pçu?, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. ACM Conf. Computer and Comm. Security, E. Al-Shaer, S. Jha, and A.D. Keromytis, eds., pp. 213-222, 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security
, pp. 213-222
-
-
Erway, C.C.1
Ku, A.2
Pçu3
Papamanthou, C.4
Tamassia, R.5
-
23
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
24
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 525-533, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
25
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
Dec
-
Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.3
Yu, M.4
-
26
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storages in clouds
-
W.C. Chu, W.E. Wong, M.J. Palakal, and C.-C. Hung, eds.
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds," Proc. ACM Symp. Applied Computing, W.C. Chu, W.E. Wong, M.J. Palakal, and C.-C. Hung, eds., pp. 1550-1557, 2011.
-
(2011)
Proc. ACM Symp. Applied Computing
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
27
-
-
57049170853
-
Publicly verifiable remote data integrity
-
L. Chen, M.D. Ryan, and G. Wang, eds., pp.
-
K. Zeng, "Publicly Verifiable Remote Data Integrity," Proc. 10th Int'l Conf. Information and Comm. Security, L. Chen, M.D. Ryan, and G. Wang, eds., pp. 419-434, 2008.
-
(2008)
Proc. 10th Int'l Conf. Information and Comm. Security
, pp. 419-434
-
-
Zeng, K.1
-
28
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
M. Matsui, ed.
-
G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage from Homomorphic Identification Protocols," Proc. Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, M. Matsui, ed., pp. 319-333, 2009.
-
(2009)
Proc. Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
29
-
-
71649085967
-
Scalable and efficient provable data possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," IACR Cryptology ePrint Archive, vol. 2008, p. 114, 2008.
-
(2008)
IACR Cryptology EPrint Archive 2008
, pp. 114
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
30
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-Based Encryption with Non-Monotonic Access Structures," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., Oct. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS '07)
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
|