-
2
-
-
84885892174
-
-
Amazon Simple Storage Service (Amazon S3), http://aws.amazon.com/s3/
-
-
-
-
3
-
-
68249129760
-
Above the clouds: A Berkeley view of cloud computing
-
University of California, Berkeley February
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley (February 2009)
-
(2009)
Technical Report UCB/EECS-2009-28, EECS Department
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proc. of SecureComm. (2008)
-
(2008)
Proc. of SecureComm.
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
5
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
August
-
Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing Data Privacy with Self-Destructing Data. In: Proc. of USENIX Security Symposium (August 2009)
-
(2009)
Proc. of USENIX Security Symposium
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
6
-
-
34547273527
-
Attribute-based encryption for FineGrained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for FineGrained Access Control of Encrypted Data. In: Proc. of ACM CCS (2006)
-
(2006)
Proc. of ACM CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
84885885070
-
-
JungleDisk, http://www.jungledisk.com/
-
-
-
-
9
-
-
84885891374
-
-
LibAWS++, http://aws.28msec.com/
-
LibAWS++
-
-
-
10
-
-
84944878354
-
-
CRC Press, Boca Raton October
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (October 1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
11
-
-
84885888244
-
-
MyAsiaCloud, http://www.myasiacloud.com/
-
-
-
-
12
-
-
36349001779
-
A hybrid PKI-IBC based ephemerizer system
-
Nair, S., Dashti, M.T., Crispo, B., Tanenbaum, A.S.: A Hybrid PKI-IBC Based Ephemerizer System. In: IFIP International Federation for Information Processing, vol. 232, pp. 241-252 (2007)
-
(2007)
IFIP International Federation for Information Processing
, vol.232
, pp. 241-252
-
-
Nair, S.1
Dashti, M.T.2
Crispo, B.3
Tanenbaum, A.S.4
-
13
-
-
84885886826
-
-
OpenSSL, http://www.openssl.org/
-
-
-
-
14
-
-
84866604596
-
File system design with assured delete
-
Perlman, R.: File System Design with Assured Delete. In: ISOC NDSS (2007)
-
(2007)
ISOC NDSS
-
-
Perlman, R.1
-
16
-
-
34547325357
-
Secure attribute-based systems
-
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Attribute-Based Systems. In: ACM CCS (2006)
-
(2006)
ACM CCS
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
17
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
18
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to Share a Secret. CACM 22(11), 612-613 (1979)
-
(1979)
CACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
84885890208
-
-
SmugMug, http://www.smugmug.com/
-
-
-
-
21
-
-
73849139655
-
Cumulus: Filesystem backup to the cloud
-
December
-
Vrable, M., Savage, S., Voelker, G.M.: Cumulus: Filesystem backup to the cloud. ACM Trans. on Storage (ToS) 5(4) (December 2009)
-
(2009)
ACM Trans. on Storage (ToS)
, vol.5
, Issue.4
-
-
Vrable, M.1
Savage, S.2
Voelker, G.M.3
-
22
-
-
77953295132
-
Privacy-preserving public auditing for storage security in cloud computing
-
March
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for storage security in cloud computing. In: Proc. of IEEE INFOCOM (March 2010)
-
(2010)
Proc. of IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
23
-
-
74049154660
-
Secure and efficient access to outsourced data
-
November
-
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: ACM Cloud Computing Security Workshop (CCSW) (November 2009)
-
(2009)
ACM Cloud Computing Security Workshop (CCSW)
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
24
-
-
74049138993
-
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
-
November
-
Yun, A., Shi, C., Kim, Y.: On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage. In: ACM Cloud Computing Security Workshop (CCSW) (November 2009)
-
(2009)
ACM Cloud Computing Security Workshop (CCSW)
-
-
Yun, A.1
Shi, C.2
Kim, Y.3
|