-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York, USA, ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable data possession at untrusted stores", Proceedings of the 14th ACM conference on Computer and communications security, CCS'07,New York, USA, ACM, 2007, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 5, May 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
5
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
September
-
Z. Hao, S. Zhong and N. Yu,"A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability", IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 9, September 2011.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, Issue.9
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
6
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy", International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
7
-
-
33749607006
-
L-diversity: Privacy beyond k-Anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-Anonymity", Proc. 22nd Intnl. Conf. Data Engg. (ICDE), page 24, 2006.
-
(2006)
Proc. 22nd Intnl. Conf. Data Engg. (ICDE
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
9
-
-
84894493930
-
-
New Mexico Expenditure Data
-
"New Mexico Expenditure Data", Online at http: //datahub.io/dataset/new-mexico-expenditure-data
-
-
-
-
11
-
-
79960917378
-
-
Technical Report 2010-11, SUNY Buffalo CSE Dept
-
Z. Hao, S. Zhong, and N. Yu, "A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability", Technical Report 2010-11, SUNY Buffalo CSE Dept., http: //www.cse.buffalo.edu/ tech-reports/2010-11.pdf, 2010.
-
(2010)
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
13
-
-
77952181552
-
Cloud computing research and development trend
-
S. Zhang, S. Zhang, X. Chen, X. Huo,"Cloud Computing Research and Development Trend", Second International Conference on Future Networks, IEEE, pp. 93-97, 2010
-
(2010)
Second International Conference on Future Networks, IEEE
, pp. 93-97
-
-
Zhang, S.1
Zhang, S.2
Chen, X.3
Huo, X.4
|