-
1
-
-
84928342138
-
-
[accessed 02.11.10]
-
Amazon S3 Versioning 2010. Available at: http://www.doc.s3.amazonaws.com/betadesign/Versioning.html [accessed 02.11.10].
-
Amazon S3 Versioning 2010
-
-
-
2
-
-
84873638307
-
'Google confirms problems with reaching its services'
-
Helft, M.: 'Google confirms problems with reaching its services' (The New York Times, 2009), http://www.developmentguruji.com/news/99/Googleconfirms-problems-with-reaching-its-services.html.
-
(2009)
The New York Times
-
-
Helft, M.1
-
3
-
-
84873636499
-
'Update from amazon regarding friday S3 downtime'
-
Stern, A.: 'Update from amazon regarding friday S3 downtime' (CenterNetworks, 2008), http://www.centernetworks.com/amazon-s3-downtime-update.
-
(2008)
CenterNetworks
-
-
Stern, A.1
-
4
-
-
84928350817
-
'T-Mobile Stumble with Sidekick Glitch'
-
Microsoft
-
Wingfield, N., Microsoft.: 'T-Mobile Stumble with Sidekick Glitch' (The Wall Street Journal, 2009), http://www.online.wsj.com/article/SB10001424052748703790404574467431941990194.html.
-
(2009)
The Wall Street Journal
-
-
Wingfield, N.1
-
5
-
-
74049102823
-
'Provable data possession at untrusted stores'
-
New York, Alexandria, VA, October 2007
-
Ateniese, G., Burns, R., Curtmola, R.: 'Provable data possession at untrusted stores'. Proc. 14th ACM Conf. on Computer and Communications Security, New York, Alexandria, VA, October 2007, pp. 598-609.
-
Proc. 14th ACM Conf. on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
6
-
-
74049121230
-
'Dynamic provable data possession'
-
New York, Chicago, November 2009
-
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: 'Dynamic provable data possession'. Proc. 16th ACM Conf. on Computer and Communications Security, New York, Chicago, November 2009, pp. 213-222.
-
Proc. 16th ACM Conf. on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
7
-
-
51849117195
-
'MR-PDP: multiple-replica provable data possession'
-
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: 'MR-PDP: multiple-replica provable data possession'. Proc. ICDCS'08, 2008, pp. 411-420.
-
(2008)
Proc. ICDCS'08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
8
-
-
70349245590
-
'Robust remote data checking'
-
Curtmola, R., Khan, O., Burns, R.: 'Robust remote data checking'. Proc. Fourth ACM Int. Workshop on Storage Security and Survivability, StorageSS, 2008, pp. 63-68.
-
(2008)
Proc. Fourth ACM Int. Workshop on Storage Security and Survivability, StorageSS
, pp. 63-68
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
9
-
-
70249129465
-
'Scalable and efficient provable data possession'
-
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: 'Scalable and efficient provable data possession'. Proc. Securecomm, 2008, pp. 1-10.
-
(2008)
Proc. Securecomm
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
10
-
-
70350389843
-
'Enabling public verifiability and data dynamics for storage security in cloud computing'
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: 'Enabling public verifiability and data dynamics for storage security in cloud computing'. Proc. 14th European Symp., Research in Computer Security (ESORICS 09), 2009, pp. 355-370.
-
(2009)
Proc. 14th European Symp., Research in Computer Security (ESORICS 09)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
11
-
-
78650081896
-
'Remote data checking for network coding-based distributed storage systems'
-
Chen, B., Curtmola, R., Ateniese, G., Burns, R.: 'Remote data checking for network coding-based distributed storage systems'. Proc. 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW'10), 2010, pp. 31-42.
-
(2010)
Proc. 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW'10)
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
12
-
-
70449569012
-
'Ensuring data storage security in cloud computing'
-
July 2009
-
Wang, C., Wang, Q., Ren, K., Lou, W.: 'Ensuring data storage security in cloud computing'. Proc. 17th Int. Workshop Quality of Service (IWQoS'09), July 2009, pp. 1-9.
-
Proc. 17th Int. Workshop Quality of Service (IWQoS'09)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
13
-
-
77953295132
-
'Privacy-preserving public auditing for data storage security in cloud computing'
-
IEEE, March 2010
-
Wang, C., Wang, Q., Ren, K., Lou, W.: 'Privacy-preserving public auditing for data storage security in cloud computing'. InfoCom2010, IEEE, March 2010, pp. 525-533.
-
InfoCom2010
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
14
-
-
77954843911
-
'Towards publicly auditable secure cloud data storage services'
-
Wang, C., Ren, K., Lou, W., Li, J.: 'Towards publicly auditable secure cloud data storage services', IEEE Netw. Mag., 2010, 24, (4), pp. 19-24 (doi: 10.1109/MNET.2010.5510914).
-
(2010)
IEEE Netw. Mag.
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
15
-
-
84861957968
-
'Toward secure and dependable storage services in cloud computing'
-
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: 'Toward secure and dependable storage services in cloud computing', IEEE Trans. Serv. Comput., 2012, 5, (2), pp. 220-232 (doi: 10.1109/TSC.2011.24).
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
16
-
-
84861959172
-
'Privacy-preserving public auditing for secure cloud storage'
-
Wang, C., Chow, S.S.W, Wang, Q., Ren, K., Lou, W.: 'Privacy-preserving public auditing for secure cloud storage', IEEE Trans. Comput., 2013, 62, (2), pp. 362-375 (doi: 10.1109/TC.2011.245).
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.W.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
17
-
-
79960900327
-
'A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability'
-
Hao, Z., Zhong, S., Yu, N.: 'A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability', IEEE Trans. Knowl. Data Eng., 2011, 23, pp. 1432-1437 (doi: 10.1109/TKDE.2011.62).
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
18
-
-
79959325063
-
'Dynamic audit services for integrity verification of outsourced storages in clouds'
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: 'Dynamic audit services for integrity verification of outsourced storages in clouds'. Proc. 2011 ACM Symp. on Applied Computing (SAC'11), 2011, pp. 1550-1557.
-
(2011)
Proc. 2011 ACM Symp. on Applied Computing (SAC'11)
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
19
-
-
84869466694
-
'Cooperative provable data possession for integrity verification in multi-cloud storage'
-
Zhu, Y., Hu, H., Ahn, G., Yu, M.: 'Cooperative provable data possession for integrity verification in multi-cloud storage', IEEE Trans. Parallel Distrib. Syst., 2012, 23, (12), pp. 2231-2244 (doi: 10.1109/TPDS.2012.66).
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.3
Yu, M.4
-
20
-
-
46649083439
-
'Efficient remote data possession checking in critical information infrastructures'
-
Sebe, F., Domingo, J.F., Martinez, A.B., Deswarte, Y., Quisquater, J.: 'Efficient remote data possession checking in critical information infrastructures', IEEE Trans. Knowl. Data Eng., 2007, 20, (8), pp. 1034-1038 (doi: 10.1109/TKDE.2007.190647).
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo, J.F.2
Martinez, A.B.3
Deswarte, Y.4
Quisquater, J.5
-
21
-
-
84881080693
-
'An efficient and secure dynamic auditing protocol for data storage in cloud computing'
-
Yang, K., Jia, X.: 'An efficient and secure dynamic auditing protocol for data storage in cloud computing', IEEE Trans. Parallel Distrib. Syst., 2013, 24, (9), pp. 1717-1726 (doi: 10.1109/TPDS.2012.278).
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
22
-
-
74049103479
-
'Proofs of retrievability for large files'
-
Juels, A., Kaliski, B.S., Pors, Jr.: 'Proofs of retrievability for large files'. Proc. 14th ACM Conf. on Computer and Communications Security (CCS'07), 2007, pp. 584-597.
-
(2007)
Proc. 14th ACM Conf. on Computer and Communications Security (CCS'07)
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
Pors, Jr.3
-
24
-
-
70350681128
-
'Proofs of retrievability via hardness amplification'
-
Dodis, Y., Vadhan, S., Wichs, D.: 'Proofs of retrievability via hardness amplification'. Proc. Sixth Theory of Cryptography Conf. on Theory of Cryptography (TCC'09), 2009, pp. 109-127.
-
(2009)
Proc. Sixth Theory of Cryptography Conf. on Theory of Cryptography (TCC'09)
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
25
-
-
74049144464
-
'Hail: a high-availability and integrity layer for cloud storage'
-
Bowers, K.D., Juels, A., Oprea, A.: 'Hail: a high-availability and integrity layer for cloud storage'. ACM Conf. on Computer and Communications Security, 2009, pp. 187-198.
-
(2009)
ACM Conf. on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
26
-
-
74049136395
-
'Proofs of retrievability: theory and implementation'
-
Bowers, K.D., Juels, A., Oprea, A.: 'Proofs of retrievability: theory and implementation'. Proc. 2009 ACM Workshop on Cloud Computing Security (CCSW'09), 2009, pp. 43-54.
-
(2009)
Proc. 2009 ACM Workshop on Cloud Computing Security (CCSW'09)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
28
-
-
84904496812
-
'Auditing the auditor: secure delegation of auditing operation over cloud storage'
-
Xu, J.: 'Auditing the auditor: secure delegation of auditing operation over cloud storage'. Proc. IACR Cryptology ePrint Archive, 2011, p. 304.
-
(2011)
Proc. IACR Cryptology ePrint Archive
, pp. 304
-
-
Xu, J.1
|