-
2
-
-
84887107917
-
-
NetworkX. http://networkx.github.com/.
-
NetworkX
-
-
-
3
-
-
84864720397
-
-
Windows azure. http://en.wikipedia.org/wiki/Windows-Azure.
-
Windows Azure
-
-
-
5
-
-
78650122895
-
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
-
S. Bleikertz, M. Schunter, C. W. Probst, D. Pendarakis, and K. Eriksson. Security audits of multi-tier virtual infrastructures in public infrastructure clouds. In ACM Cloud Computing Security Workshop, pages 93-102, 2010.
-
(2010)
ACM Cloud Computing Security Workshop
, pp. 93-102
-
-
Bleikertz, S.1
Schunter, M.2
Probst, C.W.3
Pendarakis, D.4
Eriksson, K.5
-
6
-
-
84878402955
-
Pushing back the rain - How to create trustworthy services in the cloud
-
Available at
-
D. Bogdanov and A. Kalu. Pushing back the rain - how to create trustworthy services in the cloud. ISACA Journal, 3:49-51, 2013. Available at http://www.isaca.org/Journal/Past-Issues/2013/Volume-3/Pages/default.aspx.
-
(2013)
ISACA Journal
, vol.3
, pp. 49-51
-
-
Bogdanov, D.1
Kalu, A.2
-
9
-
-
84940970717
-
-
Available at
-
B. Butler. Top 10 cloud storage providers, 2013. Available at http://www.networkworld.com/news/2013/010313-gartner-cloud-storage-265459.html.
-
(2013)
Top 10 Cloud Storage Providers
-
-
Butler, B.1
-
10
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
S. Jarecki and G. Tsudik, editors, Public Key Cryptography - PKC 2009, pages 160-179. Springer Verlag
-
I. Damgård, M. Geisler, M. Krøigård, and J. Nielsen. Asynchronous multiparty computation: Theory and implementation. In S. Jarecki and G. Tsudik, editors, Public Key Cryptography - PKC 2009, pages 160-179. Springer Verlag, LNCS 5443, 2009.
-
(2009)
LNCS
, vol.5443
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
Nielsen, J.4
-
12
-
-
84870350022
-
A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
-
D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A New Approach to Interdomain Routing Based on Secure Multi-Party Computation. In ACM SIGCOMM Workshop on Hot Topics in Networks, 2012.
-
ACM SIGCOMM Workshop on Hot Topics in Networks, 2012
-
-
Gupta, D.1
Segal, A.2
Panda, A.3
Segev, G.4
Schapira, M.5
Feigenbaum, J.6
Rexford, J.7
Shenker, S.8
-
13
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Tasty: tool for automating secure two-party computations. In ACM Conference on Computer and Communications Security, pages 451-462, 2010.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
14
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In USENIX Security Symposium, pages 298-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 298-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
15
-
-
70450278903
-
PortLand: A Scalable Fault-tolerant Layer 2 Data Center Network Fabric
-
R. N. Mysore, A. Pamboris, N. Farrington, N. Huang, P. Miri, S. Radhakrishnan, V. Subramanya, and A. Vahdat. PortLand: A Scalable Fault-tolerant Layer 2 Data Center Network Fabric. In ACM SIGCOMM, pages 39-50, 2009.
-
(2009)
ACM SIGCOMM
, pp. 39-50
-
-
Mysore, R.N.1
Pamboris, A.2
Farrington, N.3
Huang, N.4
Miri, P.5
Radhakrishnan, S.6
Subramanya, V.7
Vahdat, A.8
-
18
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
Report 2008/186, Available at
-
M. A. Shah, R. Swaminathan, and M. Baker. Privacy-preserving audit and extraction of digital contents. Cryptology ePrint Archive, Report 2008/186, 2008. Available at http://eprint.iacr.org/2008/186/.
-
(2008)
Cryptology ePrint Archive
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
20
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2):362-375, 2013.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
21
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
C. Wang, K. Ren, W. Lou, and J. Li. Toward publicly auditable secure cloud data storage services. IEEE Network, 24(4):19-24, 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
22
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM, pages 525-533, 2010.
-
(2010)
IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
23
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5):847-859, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
24
-
-
84858284080
-
Data storage auditing service in cloud computing: Challenges, methods and opportunities
-
K. Yang and X. Jia. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4):409-428, 2012.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
28
-
-
84889006767
-
-
Technical Report YALEU/DCS/TR-1479, July Available at
-
E. Zhai, D. I. Wolinsky, H. Xiao, H. Liu, X. Su, and B. Ford. Auditing the structural reliability of the clouds. Technical Report YALEU/DCS/TR-1479, July 2013. Available at http://www.cs.yale.edu/publications/techreports/tr1479. pdf.
-
(2013)
Auditing the Structural Reliability of the Clouds
-
-
Zhai, E.1
Wolinsky, D.I.2
Xiao, H.3
Liu, H.4
Su, X.5
Ford, B.6
|