-
1
-
-
77950347409
-
A view of cloud computing[j]
-
ARMBRUST M, FOX A, GRIFFITH R, et al. A View of Cloud Computing[J]. Communication of the ACM, 2010, S3(4): 50-58.
-
(2010)
Communication of the ACM
, vol.S3
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
2
-
-
85081813485
-
-
AMAZON. SmugMug Case Study: Amazon Web Services[EB/OL]. [2006]
-
AMAZON. SmugMug Case Study: Amazon Web Services[EB/OL]. [2006]. http://aws.ama-zon. com/solutions/case-studies/smugmug/.
-
-
-
-
3
-
-
79951999348
-
Study on cloud computing security[j]
-
FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on Cloud Computing Security[J]. Joumal of Software, 2011, 22(1): 71-83.
-
(2011)
Joumal of Software
, vol.22
, Issue.1
, pp. 71-83
-
-
Dengguo, F.1
Min, Z.2
Yan, Z.3
-
5
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion[j]
-
YANG Tang, Patrick P. C. Lee, John C. S. Lui, et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6): 903-916.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
-
6
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control[cl
-
September 13-16 2011. Taipei, Taiwan IEEE Computer Society Washington, DC, USA
-
ARTHUR Rahumed, Henry C. H. Chen, YANG Tang, et al. A Secure Cloud Backup System with Assured Deletion and Version Control[Cl//Proceedings of the 40th International Conference on Parallel Processing Workshops (ICPPW'11): September 13-16, 2011. Taipei, Taiwan. IEEE Computer Society Washington, DC, USA, 2011: 160-167.
-
(2011)
Proceedings of the 40th International Conference on Parallel Processing Workshops (ICPPW'11)
, pp. 160-167
-
-
Rahumed, A.1
Chen, H.C.H.2
Tang, Y.3
-
7
-
-
85018107502
-
Vanish: Increasing data privacy with self-de-structing data[cl
-
Montreal, Canada. Berkeley, CA: USENIX Association
-
ROXANA G, TADAYOSHI K, AMIT A. Levy, et al. Vanish: Increasing Data Privacy with Self-De-structing Data[Cl//Proceedings of USENIX Se-curity'09: August 10-14, 2009. Montreal, Canada. Berkeley, CA: USENIX Association, 2009: 299-316.
-
(2009)
Proceedings of USENIX Se-curity'09: August 10-14 2009
, pp. 299-316
-
-
Roxana, G.1
Tadayoshi, K.2
Levy, A.A.3
-
8
-
-
79955052666
-
Research on the model and algorithms based on distributed spanning tree for resource location service[j]
-
WANG Tiejun, LlU Heng, SUN Ming, et al. Research on the Model and Algorithms based on Distributed Spanning Tree for Resource Location Service[J]. Acta Electronica Sinica, 2011, 39(1): 364-369.
-
(2011)
Acta Electronica Sinica
, vol.39
, Issue.1
, pp. 364-369
-
-
Tiejun, W.1
Heng, L.2
Ming, S.3
-
9
-
-
79952391701
-
SafeVanish: An improved data self-destruction for protecting data privacy[cl
-
November 30-December 3, 2010. Indianapolis, Indiana, USA. New York: IEEE Press
-
ZENG Lingfang, SHI Zhan, XU Shengjie, et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy[Cl//Proceedings of the 2nd IEEE Intemational Conference on Cloud Computing Technology and Science: November 30-December 3, 2010. Indianapolis, Indiana, USA. New York: IEEE Press, 2010: 521-528.
-
(2010)
Proceedings of the 2nd IEEE Intemational Conference on Cloud Computing Technology and Science
, pp. 521-528
-
-
Lingfang, Z.1
Zhan, S.2
Shengjie, X.U.3
-
10
-
-
85180531810
-
Defeating vanish with low-cost sybil attacks against large dhts[cl
-
February 28-March 3 2010. San Diego, California, USA. Washington, DC: Intemet Society
-
SCOTT W, OWEN S. Hofmann, NADIA H, et al. Defeating Vanish with Low-cost Sybil Attacks Against Large DHTs[ClI/Proceedings of the 17th Network and Distributed System Security Symposium (NDSS'10): February 28-March 3, 2010. San Diego, California, USA. Washington, DC: Intemet Society, 2010: 37-51.
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS'10)
, pp. 37-51
-
-
Scott, W.1
Hofmann, O.S.2
Nadia, H.3
-
11
-
-
84859234133
-
A data assured deletion approach adapted for cloud storage[j]
-
WANG Lina, REN Zhengwei, YU Rongwei, et al. A Data Assured Deletion Approach Adapted for Cloud Storage[J]. Acta Electronica Sinica, 2012, 40(2): 266-272.
-
(2012)
Acta Electronica Sinica
, vol.40
, Issue.2
, pp. 266-272
-
-
Lina, W.1
Zhengwei, R.2
Rongwei, Y.U.3
-
12
-
-
74049154660
-
Secure and efficient access to outsourced data[c]
-
November 13, 2009. Chicago, USA. New York: ACM Press
-
WANG Weichao, LI Zhiwei, RODNEY Owens, et al. Secure and Efficient Access to Outsourced Data[C]//Proceedings of the 2009 ACM Wok-shop on Cloud Computing Security (CCSW'09): November 13, 2009. Chicago, USA. New York: ACM Press, 2009: 55-65.
-
(2009)
Proceedings of the 2009 ACM Wok-shop on Cloud Computing Security (CCSW'09)
, pp. 55-65
-
-
Weichao, W.1
Zhiwei, L.I.2
Owens, R.3
-
13
-
-
79951805169
-
A secure self-destructing scheme for electronic data[c]
-
December 11-13, 2010. Changsha, China. New York: IEEE Press
-
YUE Fengshun, WANG Guojun, LlU Qin. A Secure Self-Destructing Scheme for Electronic Data[C]//Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'10): December 11-13, 2010. Changsha, China. New York: IEEE Press, 2010: 651-658.
-
(2010)
Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'10)
, pp. 651-658
-
-
Fengshun, Y.1
Guojun, W.2
Qin, L.3
-
14
-
-
84874283560
-
Se-cure deletion for a versioning file system[c]
-
December 13-16 2005. San Francisco, California, USA. USENIX Association Berkeley, CA, USA
-
ZACHARY N. J. Peterson, RANDAL B, JOE H. Se-cure Deletion for a Versioning File System[C]//Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05): December 13-16, 2005. San Francisco, California, USA. USENIX Association Berkeley, CA, USA, 2005: 143-154.
-
(2005)
Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)
, pp. 143-154
-
-
Peterson, Z.N.J.1
Randal, B.2
Joe, H.3
-
15
-
-
84055187789
-
EphPub: Toward robust ephemeral publishing[cl
-
October 17-20 2011. Vancouver, Canada. IEEE Computer Society Washington, DC, USA
-
CASTELLUCCIA C, DE Cristofaro E, FRANCILLON A, et al. EphPub: Toward Robust Ephemeral Publishing[Cl//Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP'11): October 17-20, 2011. Vancouver, Canada. IEEE Computer Society Washington, DC, USA, 2011: 165-175.
-
(2011)
Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP'11)
, pp. 165-175
-
-
Castelluccia, C.1
De Cristofaro, E.2
Francillon, A.3
-
18
-
-
84947912552
-
All-or-nothing encryption and the package transform[cl
-
January 20-22, 1997. Haifa, Israel. Springer-Verlag Berlin, Heidelberg
-
RIVEST R L All-or-Nothing Encryption and the Package Transform[Cl// Proceedings of the 1997 Fast Software Encryption Conference (FSE'97): January 20-22, 1997. Haifa, Israel. Springer-Verlag Berlin, Heidelberg, 1997: 210-218.
-
(1997)
Proceedings of the 1997 Fast Software Encryption Conference (FSE'97)
, pp. 210-218
-
-
Rivest, R.L.1
-
19
-
-
80955144922
-
Enabling security in cloud storage slas with cloudproof[c]
-
June 15-17, 2011. Portland, Oregon, USA. USENIX Association Berkeley, CA, USA
-
POPA R A. LORCH J R, MOLNAR D, et al. Enabling Security in Cloud Storage SLAs with Cloudproof[C]//Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (SENIXATC'11): June 15-17, 2011. Portland, Oregon, USA. USENIX Association Berkeley, CA, USA, 2011: 31-31.
-
(2011)
Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (SENIXATC'11)
, pp. 31-31
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
-
20
-
-
0036373715
-
Reclaiming space from duplicate files in a server-less distributed file system[cl
-
July 2-5 2002. Vienna, Austria. IEEE Computer Society Washington, DC, USA
-
DOUCEUR J R, ADYA A, BOLOSKY W J, et al. Reclaiming Space from Duplicate Files in a Server-less Distributed File System[Cl//Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS'02): July 2-5, 2002. Vienna, Austria. IEEE Computer Society Washington, DC, USA, 2002: 617-624.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS'02)
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
-
21
-
-
70349237760
-
Secure data deduplication[c]
-
October 31 2008. Fairfax, Virginia, USA. New York: ACM Press
-
STORER M W, GREENAN K, LONG D D, et al. Secure Data Deduplication[C]// Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS '08): October 31, 2008. Fairfax, Virginia, USA. New York: ACM Press, 2008: 1-10.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS '08)
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
-
22
-
-
77953280666
-
Data dedupli-cation techniques[j]
-
AO Li, SHU Jiwu, LI Mingqiang. Data Dedupli-cation Techniques[J]. Journal of Software, 2010, 21 (5): 916-929.
-
(2010)
Journal of Software
, vol.21
, Issue.5
, pp. 916-929
-
-
Li, A.O.1
Jiwu, S.2
Mingqiang, L.I.3
-
23
-
-
0018545449
-
How to share a secret[j]
-
SHAMIR A. How to Share a Secret[J]. Communications of the AMC, 1979, 22(11): 612-613.
-
(1979)
Communications of the AMC
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
80052798570
-
Capability of evolutionary cryptosystems against differential cryptanalysis[j]
-
ZHANG HuanGuo, LI ChunLei, TANG Ming. Capability of Evolutionary Cryptosystems Against Differential Cryptanalysis[J]. Science China Information Science, 2011, 54(10): 1991-2000.
-
(2011)
Science China Information Science
, vol.54
, Issue.10
, pp. 1991-2000
-
-
Huanguo, Z.1
Chunlei, L.I.2
Ming, T.3
-
25
-
-
84867869103
-
Evolutionary chipers against differential power analysis and differential fault analysis[j]
-
TANG Ming, QIU ZhenLong, YANG Min, et al. Evolutionary Chipers Against Differential Power Analysis and Differential Fault Analysis[J]. Science China Information Science, 2012, 55(11): 2555-2569.
-
(2012)
Science China Information Science
, vol.55
, Issue.11
, pp. 2555-2569
-
-
Ming, T.1
Zhenlong, Q.2
Min, Y.3
|