-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
ATENIESE, G., BURNS, R., CURTMOLA, R., HERRING, J., KISSNER, L., PETERSON, Z., AND SONG, D. Provable data possession at untrusted stores. In ACM CCS (2007).
-
(2007)
ACM CCS
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
0027764777
-
A cryptographic file system for unix
-
BLAZE, M. A cryptographic file system for unix. In ACM CCS (1993).
-
(1993)
ACM CCS
-
-
Blaze, M.1
-
5
-
-
24944498581
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
BONEH, D., GENTRY, C., AND WATERS, B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Lecture Notes in Computer Science (2005).
-
(2005)
Lecture Notes in Computer Science
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
6
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
BOWERS, K. D., JUELS, A., AND OPREA, A. HAIL: A High-Availability and Integrity Layer for Cloud Storage. CCS (2009).
-
(2009)
CCS
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
7
-
-
41149141331
-
Practical byzantine fault tolerance and proactive recovery
-
CASTRO, M., AND LISKOV, B. Practical byzantine fault tolerance and proactive recovery. ACM TOCS (2002).
-
(2002)
ACM TOCS
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
85080490043
-
Attested append-only memory: Making adversaries stick to their word
-
CHUN, B.-G., MANIATIS, P., SHENKER, S., AND KUBIATOWICZ, J. Attested Append-Only Memory: Making Adversaries Stick to their Word. SOSP (2009).
-
(2009)
SOSP
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
9
-
-
78650345904
-
Proofs of retrievability via hardness amplification
-
DODIS, Y., VADHAN, S., AND WICHS, D. Proofs of Retrievability via Hardness Amplification. TCC (2009).
-
(2009)
TCC
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
10
-
-
85033498470
-
Sirius: Securing remote unstrusted storage
-
E.-J. GOH, H. SHACHAM, N. M., AND BONEH, D. Sirius: Securing remote unstrusted storage. In NDSS (2003).
-
(2003)
NDSS
-
-
Goh, E.-J.1
Shacham, H.2
Boneh, D.3
-
11
-
-
84929577463
-
-
FE R D OW S I, A. S3 data corruption?, 2008. http://developer.amazonwebservices.com/connect/ thread.jspa?threadID=22709&start=0&tstart=0.
-
(2008)
S3 Data Corruption?
-
-
Fe, R.D.1
Ow, S.I.2
-
15
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious RAMs. J. ACM (1996).
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
17
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
JUELS, A., AND KALISKI, B. PORs: Proofs of retrievability for large files. In ACM CCS (2007).
-
(2007)
ACM CCS
-
-
Juels, A.1
Kaliski, B.2
-
18
-
-
4544290272
-
Plutus: Scalable secure file sharing on untrusted storage
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. Plutus: Scalable Secure File Sharing on Untrusted Storage. In USENIX FAST (2003).
-
(2003)
USENIX FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
20
-
-
26444479283
-
SuNDR: Secure untrusted data repository
-
LI, J., KROHN, M., MAZIERES, D., AND SHASHA, D. SUNDR: Secure untrusted data repository. In OSDI (2004).
-
(2004)
OSDI
-
-
Li, J.1
Krohn, M.2
Mazieres, D.3
Shasha, D.4
-
22
-
-
84864720397
-
-
MICROSOFT CORPORATION. Windows Azure. http://www.microsoft.com/windowsazure.
-
Windows Azure
-
-
-
24
-
-
85080586231
-
Design and implementation of verifiable audit trails for a versioning file system
-
PETERSON, Z. N. J., BURNS, R., AND ATENIESE, G. Design and Implementation of Verifiable Audit Trails for a Versioning File System. USENIX FAST (2007).
-
(2007)
USENIX FAST
-
-
Peterson, Z.N.J.1
Burns, R.2
Ateniese, G.3
-
25
-
-
74049095755
-
Compact proofs of retrievability
-
SACHAM, H., AND WATERS, B. Compact Proofs of Retrievability. ASIACRYPT (2008).
-
(2008)
ASIACRYPT
-
-
Sacham, H.1
Waters, B.2
-
26
-
-
85084161255
-
Cryptographic support for secure logs on untrusted machines
-
SCHNEIER, B., AND KERSEY, J. Cryptographic Support for Secure Logs on Untrusted Machines. USENIX Security (1998).
-
(1998)
USENIX Security
-
-
Schneier, B.1
Kersey, J.2
-
27
-
-
85141026002
-
On the computational practicality of private information retrieval
-
SION, R., AND CARBUNAR, B. On the computational practicality of private information retrieval. In NDSS (2007).
-
(2007)
NDSS
-
-
Sion, R.1
Carbunar, B.2
-
29
-
-
85016014408
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
WANG, Q., WANG, C., LI, J., REN, K., AND LOU, W. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS (2009).
-
(2009)
ESORICS
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
30
-
-
77955959000
-
Antiquity: Exploiting a secure log for wide-area distributed storage
-
WEATHERSPOON, H., EATON, P., CHUN, B.-G., AND KUBIATOWICZ, J. Antiquity: Exploiting a Secure Log for Wide-area Distributed Storage. ACM SIGOPS (2007).
-
(2007)
ACM SIGOPS
-
-
Weatherspoon, H.1
Eaton, P.2
Chun, B.-G.3
Kubiatowicz, J.4
-
32
-
-
85080567905
-
-
WINDOWS AZURE PLATFORM. Azure SDK, 2009. http://msdn.microsoft.com/en-us/library/dd179367.aspx.
-
(2009)
Azure SDK
-
-
|