-
1
-
-
84885800180
-
Service discovery architecture applied in cloud computing environments
-
Zhang Jie, He Liwen, Huang Peiyi, et al. Service discovery architecture applied in cloud computing environments[J]. Journal of Nanjing University of Aeronautics and Astronautics, 2013, 45(4): 556-562.
-
(2013)
Journal of Nanjing University of Aeronautics and Astronautics
, vol.45
, Issue.4
, pp. 556-562
-
-
Zhang, J.1
He, L.2
Huang, P.3
-
3
-
-
84975760404
-
AWS outage knocks Amazon, Netflix, Tinder and IMDb in MEGA data collapse
-
2015-09-20
-
Fiveash K. AWS outage knocks Amazon, Netflix, Tinder and IMDb in MEGA data collapse[EB/OL]. http://www.theregister.co.uk/2015/09/20/aws_database_outage/, 2015-09-20.
-
-
-
Fiveash, K.1
-
4
-
-
84975779490
-
Google suffered a rare but major outage early Thursday
-
2015-03-12
-
O'Reilly L. Google suffered a rare but major outage early Thursday[EB/OL]. http://www.businessinsider.com/google-is-down-2015-3, 2015-03-12.
-
-
-
O'Reilly, L.1
-
5
-
-
84975779510
-
Google SSL certificate update error affects millions of Gmail users
-
2015-04-07
-
Neal D. Google SSL certificate update error affects millions of Gmail users[EB/OL]. http://www.v3.co.uk/v3-uk/news/2402863/google-ssl-certificate-update-error-affects-millions-of-gmail-users, 2015-04-07.
-
-
-
Neal, D.1
-
6
-
-
84907737354
-
Secure and privacy-preserving data storage service in public cloud
-
Li Hui, Sun Wenhai, Li Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
-
(2014)
Journal of Computer Research and Development
, vol.51
, Issue.7
, pp. 1397-1409
-
-
Li, H.1
Sun, W.2
Li, F.3
-
7
-
-
84930172379
-
A secure storage system over cloud storage environment
-
Xue Mao, Xue Wei, Shu Jiwu, et al. A secure storage system over cloud storage environment[J]. Chinese Journal of Computers, 2015, 38(5): 987-998.
-
(2015)
Chinese Journal of Computers
, vol.38
, Issue.5
, pp. 987-998
-
-
Xue, M.1
Xue, W.2
Shu, J.3
-
8
-
-
84941657639
-
Provident resource defragmentation algorithm for cloud data center network
-
Guo Lei, Hou Weigang. Provident resource defragmentation algorithm for cloud data center network[J]. Journal of Data Acquisition and Processing, 2015, 30(3): 519-527.
-
(2015)
Journal of Data Acquisition and Processing
, vol.30
, Issue.3
, pp. 519-527
-
-
Guo, L.1
Hou, W.2
-
11
-
-
84916638740
-
A secure data deduplication scheme for cloud storage
-
Berlin, Heidelberg: Springer
-
Stanek J, Sorniotti A, Androulaki E, et al. A secure data deduplication scheme for cloud storage[M]. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer, 2014: 99-118.
-
(2014)
Financial Cryptography and Data Security
, pp. 99-118
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
-
16
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
Berlin, Heidelberg: Springer
-
Goodrich M T, Mitzenmacher M. Privacy-preserving access of outsourced data via oblivious RAM simulation[M]//Automata, Languages and Programming. Berlin, Heidelberg: Springer, 2011: 576-587.
-
(2011)
Automata, Languages and Programming
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
21
-
-
84881250193
-
Oblivistore: High performance oblivious cloud storage
-
Berkeley: IEEE
-
Stefanov E, Shi E. Oblivistore: High performance oblivious cloud storage[C]//IEEE Symposium on Security and Privacy (SP). Berkeley: IEEE, 2013: 253-267.
-
(2013)
IEEE Symposium on Security and Privacy (SP)
, pp. 253-267
-
-
Stefanov, E.1
Shi, E.2
-
24
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
-
30
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services: Deduplication in cloud storage[J]. IEEE Security and Privacy, 2010, 8(6): 40-47.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
32
-
-
84954099286
-
Practicing oblivious access on cloud storage: The gap, the fallacy, and the new way forward
-
Denver: ACM
-
Bindschaedler V, Naveed M, Pan X, et al. Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Denver: ACM, 2015: 837-849.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 837-849
-
-
Bindschaedler, V.1
Naveed, M.2
Pan, X.3
-
33
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs[J]. Journal of the ACM (JACM), 1996, 43(3): 431-473.
-
(1996)
Journal of the ACM (JACM)
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
36
-
-
80955149556
-
Remote oblivious storage: Making oblivious RAM practical
-
2011-03-30/2016-02-18
-
Boneh D, Mazieres D, Popa R A. Remote oblivious storage: Making oblivious RAM practical[EB/OL]. http://dspace.mit.edu/bitstream/handle/1721.1/62006/MIT-CSAIL-TR-2011-018.pdf, 2011-03-30/2016-02-18.
-
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
39
-
-
82955198777
-
Towards practical oblivious RAM
-
2012-12-18
-
Stefanov E, Shi E, Song D. Towards practical oblivious RAM[EB/OL]. Http://arxiv.org/abs/1106.3652, 2012-12-18.
-
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
40
-
-
84937774864
-
Burst ORAM: Minimizing ORAM response times for bursty access patterns
-
San Diego
-
Dautrich J, Stefanov E, Shi E. Burst ORAM: Minimizing ORAM response times for bursty access patterns[C]//23rd USENIX Security Symposium. San Diego: [s. n.], 2014: 749-764.
-
(2014)
23rd USENIX Security Symposium
, pp. 749-764
-
-
Dautrich, J.1
Stefanov, E.2
Shi, E.3
-
41
-
-
84904183905
-
-
Heidelberg: Springer Berlin Heidelberg
-
Ohrimenko O, Goodrich M T, Tamassia R, et al. Automata, Languages, and Programming[M]. Heidelberg: Springer Berlin Heidelberg, 2014: 556-567.
-
(2014)
Automata, Languages, and Programming
, pp. 556-567
-
-
Ohrimenko, O.1
Goodrich, M.T.2
Tamassia, R.3
-
42
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York: Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84 on Advances in Cryptology. New York: Springer-Verlag, 1985: 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
45
-
-
84886903289
-
Dac-macs: Effective data access control for multiauthority cloud storage systems
-
Yang K, Jia X, Ren K, et al. Dac-macs: Effective data access control for multiauthority cloud storage systems[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1790-1801.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
47
-
-
84883284958
-
The OAuth 2.0 authorization framework
-
2016-02-18
-
Hardt D. The OAuth 2.0 authorization framework[EB/OL]. Https://www.rfc-editor.org/rfc/rfc6749.txt, 2016-02-18.
-
-
-
Hardt, D.1
-
48
-
-
84881537144
-
Toward privacy-assured and searchable cloud data storage services
-
Li M, Yu S, Ren K, et al. Toward privacy-assured and searchable cloud data storage services[J]. IEEE Network, 2013, 27(4): 56-62.
-
(2013)
IEEE Network
, vol.27
, Issue.4
, pp. 56-62
-
-
Li, M.1
Yu, S.2
Ren, K.3
-
49
-
-
84919829652
-
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
-
Jung T, Li X Y, Wan Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 190-199.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.1
, pp. 190-199
-
-
Jung, T.1
Li, X.Y.2
Wan, Z.3
-
51
-
-
84928139575
-
Enabling cloud storage auditing with key-exposure resistance
-
Yu J, Ren K, Wang C, et al. Enabling cloud storage auditing with key-exposure resistance[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1167-1179.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.6
, pp. 1167-1179
-
-
Yu, J.1
Ren, K.2
Wang, C.3
-
53
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Zhu Y, Hu H, Ahn G J, et al. Cooperative provable data possession for integrity verification in multicloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231-2244.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
-
54
-
-
84878830854
-
Dynamic audit services for outsourced storages in clouds
-
Zhu Y, Ahn G J, Hu H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.
-
(2013)
IEEE Transactions on Services Computing
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.J.2
Hu, H.3
-
55
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Wei L, Zhu H, Cao Z, et al. Security and privacy for storage and computation in cloud computing[J]. Information Sciences, 2014, 258: 371-386.
-
(2014)
Information Sciences
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
-
56
-
-
79958074367
-
A forward-secure digital signature scheme
-
Heidelberg: Springer Berlin
-
Bellare M, Miner S K. A forward-secure digital signature scheme[C]//Advances in Cryptology-Crypto'99. Heidelberg: Springer Berlin, 1999: 431-448.
-
(1999)
Advances in Cryptology-Crypto'99
, pp. 431-448
-
-
Bellare, M.1
Miner, S.K.2
|