-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer Comm. Security, pp. 598-609, 2007.
-
(2007)
Proc. 14th ACM Conf. Computer Comm. Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug
-
F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures," IEEE Trans. Knowledge Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowledge Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
3
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security Privacy Comm. Networks, pp. 1-10, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security Privacy Comm. Networks
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
4
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer Comm. Security, pp. 213-222, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer Comm. Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
5
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research Computer Security, pp. 355-370, 2009.
-
(2009)
Proc. 14th European Conf. Research Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
6
-
-
84863642638
-
Provable possession and replication of data over cloud servers
-
Centre for Applied Cryptographic Research
-
A.F. Barsoum and M.A. Hasan, "Provable Possession and Replication of Data over Cloud Servers," Technical Report 2010/32, Centre for Applied Cryptographic Research, http://www.cacr.math.uwaterloo.ca/techreports/2010/ cacr2010-32.pdf. 2010.
-
(2010)
Technical Report 2010/32
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
7
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," Proc. 28th Int'l Conf. Distributed Computing Systems, pp. 411-420, 2008.
-
(2008)
Proc. 28th Int'l Conf. Distributed Computing Systems
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
8
-
-
84874296531
-
On verifying dynamic multiple data copies over cloud servers
-
Cryptology Eprint Archive
-
A.F. Barsoum and M.A. Hasan, "On Verifying Dynamic Multiple Data Copies over Cloud Servers," Technical Report 2011/447, Cryptology Eprint Archive, http://eprint.iacr.org/, 2011.
-
(2011)
Technical Report 2011/447
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
9
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K.D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Proc. 16th ACM Conf. Computer Comm. Security, pp. 187-198, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer Comm. Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
13
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. Second USENIX Conf. File Storage Technologies, 2003.
-
(2003)
Proc. Second USENIX Conf. File Storage Technologies
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
14
-
-
85033498470
-
SiRiUS: Securing remote entrusted storage
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing Remote entrusted Storage," Proc. Network Distributed System Security Symp., 2003.
-
(2003)
Proc. Network Distributed System Security Symp.
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
15
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," Proc. Network Distributed System Security Symp., 2005.
-
(2005)
Proc. Network Distributed System Security Symp.
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
16
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-Encryption: Management of Access Control Evolution on Outsourced Data," Proc. 33rd Int'l Conf. Very Large Data Bases, pp. 123-134, 2007.
-
(2007)
Proc. 33rd Int'l Conf. Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
17
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer Comm. Security (CCS '06), pp. 89-98, 2006. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
18
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, 2010.
-
(2010)
Proc. IEEE INFOCOM '10
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
19
-
-
85032616916
-
Enabling security in cloud storage SLAs with cloud proof
-
R.A. Popa, J.R. Lorch, D. Molnar, H.J. Wang, and L. Zhuang, "Enabling Security in Cloud Storage SLAs with Cloud Proof," Proc. USENIX Conf., 2011.
-
(2011)
Proc. USENIX Conf.
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
21
-
-
74049154660
-
Secure and efficient access to outsourced data
-
W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and Efficient Access to Outsourced Data," Proc. ACM Workshop Cloud Computing Security, pp. 55-66, 2009.
-
(2009)
Proc. ACM Workshop Cloud Computing Security
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
22
-
-
33750228447
-
Secure key-updating for lazy revocation
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
M. Backes, C. Cachin, and A. Oprea, "Secure Key-Updating for Lazy Revocation," Proc. 11th European Symp. Research Computer Security, pp. 327-346, 2006. (Pubitemid 44609865)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189
, pp. 327-346
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
23
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
D. Boneh, C. Gentry, and B. Waters, "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys," Proc. Advances Cryptology, pp. 258-275, 2005. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
24
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Proc. Seventh Int'l Conf. Theory Application Cryptology Information Security, pp. 514-532, 2001. (Pubitemid 33371204)
-
(2002)
Lecture Notes In Computer Science
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
26
-
-
84887867618
-
-
Amazon Web Service
-
Amazon Web Service, http://aws.amazon.com/, 2013.
-
(2013)
-
-
-
28
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
Cryptology ePrint Archive
-
D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer," Technical Report 2006/150, Cryptology ePrint Archive, 2006.
-
(2006)
Technical Report 2006/150
-
-
Filho, D.L.G.1
Barreto, P.S.L.M.2
-
29
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. 21st Annu. Int'l Cryptology Conf. Advances Cryptology, pp. 41-62, 2001. (Pubitemid 33317907)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
30
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible Protocols and Atomic Proxy Cryptography," Proc. Eurocrypt, pp. 127-144, 1998. (Pubitemid 128081481)
-
(1998)
Lecture Notes In Computer Science
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
31
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
DOI 10.1145/1102120.1102147, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
M.J. Atallah, K.B. Frikken, and M. Blanton, "Dynamic and Efficient Key Management for Access Hierarchies," Proc. 12th ACM Conf. Computer Comm. Security, pp. 190-202, 2005. (Pubitemid 44022003)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
32
-
-
78649885971
-
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
-
J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage Platforms," Proc. 39th Int'l Conf. Parallel Processing, pp. 251-258, 2010.
-
(2010)
Proc. 39th Int'l Conf. Parallel Processing
, pp. 251-258
-
-
Feng, J.1
Chen, Y.2
Ku, W.-S.3
Liu, P.4
-
33
-
-
83255162621
-
A fair multi-party non-repudiation scheme for storage clouds
-
J. Feng, Y. Chen, and D.H. Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," Proc. Int'l Conf. Collaboration Technologies Systems, pp. 457-465, 2011.
-
(2011)
Proc. Int'l Conf. Collaboration Technologies Systems
, pp. 457-465
-
-
Feng, J.1
Chen, Y.2
Summerville, D.H.3
|