메뉴 건너뛰기




Volumn , Issue , 2014, Pages 317-334

Heading off correlated failures through independence-as-a-service

Author keywords

[No Author keywords available]

Indexed keywords

REDUNDANCY; SYSTEMS ANALYSIS;

EID: 85076933301     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (75)
  • 1
    • 1142303699 scopus 로고    scopus 로고
    • Information sharing across private databases
    • June
    • Rakesh Agrawal, Alexandre V. Evfimievski, and Ramakrishnan Srikant. Information sharing across private databases. In ACM SIGMOD, June 2003.
    • (2003) ACM SIGMOD
    • Agrawal, R.1    Evfimievski, A.V.2    Srikant, R.3
  • 3
    • 85080579508 scopus 로고    scopus 로고
    • accessed on Sep 9, 2014
    • Amazon S3's redundant storage. http://aws.amazon.com/s3/, accessed on Sep 9, 2014.
    • Amazon S3's Redundant Storage
  • 5
    • 36949029788 scopus 로고    scopus 로고
    • Towards highly reliable enterprise network services via inference of multi-level dependencies
    • August
    • Paramvir Bahl, Ranveer Chandra, Albert G. Greenberg, Srikanth Kandula, David A. Maltz, and Ming Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. In ACM SIGCOMM, August 2007.
    • (2007) ACM SIGCOMM
    • Bahl, P.1    Chandra, R.2    Greenberg, A.G.3    Kandula, S.4    Maltz, D.A.5    Zhang, M.6
  • 8
    • 85080487091 scopus 로고    scopus 로고
    • accessed on Sep 9, 2014
    • Basho Technologies. Riak. http://basho.com/riak/, accessed on Sep 9, 2014.
    • Riak
  • 11
    • 84872732449 scopus 로고    scopus 로고
    • Espresso: Efficient privacy-preserving evaluation of sample set similarity
    • September
    • Carlo Blundo, Emiliano de Cristofaro, and Paolo Gasti. EsPRESSo: Efficient privacy-preserving evaluation of sample set similarity. In DPM/SETOP, September 2012.
    • (2012) DPM/SETOP
    • Blundo, C.1    De Cristofaro, E.2    Gasti, P.3
  • 12
  • 16
    • 85080471077 scopus 로고    scopus 로고
    • Lightning strikes Amazon's European cloud
    • August accessed on Sep 9, 2014
    • Jack Clark. Lightning strikes Amazon's European cloud. ZDNet, August 2011. http://www.zdnet.com/lightningstrikes-amazons-european-cloud-3040093641/, accessed on Sep 9, 2014.
    • (2011) ZDNet
    • Clark, J.1
  • 21
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • May
    • Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In EUROCRYPT, May 2004.
    • (2004) EUROCRYPT
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 22
    • 80053165806 scopus 로고    scopus 로고
    • Understanding network failures in data centers: Measurement, analysis, and implications
    • August
    • Phillipa Gill, Navendu Jain, and Nachiappan Nagappan. Understanding network failures in data centers: Measurement, analysis, and implications. In ACM SIGCOMM, August 2011.
    • (2011) ACM SIGCOMM
    • Gill, P.1    Jain, N.2    Nagappan, N.3
  • 23
    • 85080562547 scopus 로고    scopus 로고
    • Lawfare, April accessed on Sep 9, 2014
    • Dan Greer. Heartbleed as metaphor. Lawfare, April 2014. http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/, accessed on Sep 9, 2014.
    • (2014) Heartbleed as Metaphor
    • Greer, D.1
  • 28
    • 85080584414 scopus 로고    scopus 로고
    • Apple's iCloud runs on Microsoft's Azure and Amazon's cloud
    • September accessed on Sep 9, 2014
    • Devindra Hardawar. Apple's iCloud runs on Microsoft's Azure and Amazon's cloud. VentureBeat News, September 2011. http://venturebeat.com/2011/09/03/ icloud-azure-amazon/, accessed on Sep 9, 2014.
    • (2011) VentureBeat News
    • Hardawar, D.1
  • 32
    • 0001368373 scopus 로고
    • Étude comparative de la distribution florale dans une portion des Alpes et du Jura
    • June
    • Paul Jaccard. Étude comparative de la distribution florale dans une portion des Alpes et du Jura. Bulletin de la Société Vaudoise des Sciences Naturelles, 37(142):547-579, June 1901.
    • (1901) Bulletin de la Société Vaudoise Des Sciences Naturelles , vol.37 , Issue.142 , pp. 547-579
    • Jaccard, P.1
  • 40
    • 85080493290 scopus 로고    scopus 로고
    • CRN, January accessed on Sep 9, 2014
    • Sarah Kuranda. The 10 Biggest Cloud Outages of 2013. CRN, January 2014. http://www.crn.com/slide-shows/cloud/240165024/ the-10-biggest-cloud-outages-of-2013.htm, accessed on Sep 9, 2014.
    • (2014) The 10 Biggest Cloud Outages of 2013
    • Kuranda, S.1
  • 46
  • 48
    • 84870723113 scopus 로고    scopus 로고
    • accessed on Sep 9, 2014
    • National Institute of Standards and Technology. Common Vulnerability Scoring System (CVSS). http://nvd.nist.gov/cvss. cfm, accessed on Sep 9, 2014.
    • Common Vulnerability Scoring System (CVSS)
  • 49
    • 85080607175 scopus 로고    scopus 로고
    • accessed on Sep 9, 2014
    • NetworkX. http://networkx.github.com/, accessed on Sep 9, 2014.
  • 50
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Cor-resp.)
    • Stephen C. Pohlig and Martin E. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Cor-resp.). IEEE Transactions on Information Theory, 24(1):106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 51
    • 84893268396 scopus 로고    scopus 로고
    • When the network crumbles: An empirical study of cloud network failures and their impact on services
    • October
    • Rahul Potharaju and Navendu Jain. When the network crumbles: An empirical study of cloud network failures and their impact on services. In ACM Symposium on Cloud Computing (SoCC), October 2013.
    • (2013) ACM Symposium on Cloud Computing (SoCC)
    • Potharaju, R.1    Jain, N.2
  • 56
    • 4544336448 scopus 로고
    • Technical Massachusetts Institute of Technology, February
    • Adi Shamir, Ron Rivest, and Leonard Adleman. Mental poker. Technical Report LCS/TM-125, Massachusetts Institute of Technology, February 1979.
    • (1979) Mental Poker
    • Shamir, A.1    Rivest, R.2    Adleman, L.3
  • 58
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Jaideep Vaidya and Chris Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, (4):593-622, 2005.
    • (2005) Journal of Computer Security , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 59
    • 0000142982 scopus 로고
    • The complexity of enumeration and reliability problems
    • Leslie G. Valiant. The Complexity of Enumeration and Reliability Problems. SIAM Journal of Computing, 8(3):410-421, 1979.
    • (1979) SIAM Journal of Computing , vol.8 , Issue.3 , pp. 410-421
    • Valiant, L.G.1
  • 61
    • 51349120429 scopus 로고    scopus 로고
    • accessed on Sep 9, 2014
    • Lyonel Vincent. Hardware Lister (lshw). http://ezix.org/project/wiki/ HardwareLiSter, accessed on Sep 9, 2014.
    • Hardware Lister (Lshw)
    • Vincent, L.1
  • 63
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2):362-375, 2013.
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 64
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Toward publicly auditable secure cloud data storage services. IEEE Network, 24(4):19-24, 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 65
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • March
    • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou. Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM, March 2010.
    • (2010) IEEE INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 66
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5):847-859, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 71
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • Kan Yang and Xiaohua Jia. Data storage auditing service in cloud computing: Challenges, methods and opportunities. World Wide Web, 15(4):409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 73
    • 85080600044 scopus 로고    scopus 로고
    • Scalable private set intersection cardinality for capture-recapture with multiple private datasets
    • Technical
    • Sebastian Zander, Lachlan L. H. Andrew, and Grenville Armitage. Scalable private set intersection cardinality for capture-recapture with multiple private datasets. In Centre for Advanced Internet Architectures, Technical Report 130930A, 2013.
    • (2013) Centre for Advanced Internet Architectures
    • Zander, S.1    Andrew, L.L.H.2    Armitage, G.3
  • 74
    • 85165462476 scopus 로고    scopus 로고
    • An untold story of redundant clouds: Making your service deployment truly reliable
    • HotDep), November
    • Ennan Zhai, Ruichuan Chen, David Isaac Wolinsky, and Bryan Ford. An untold story of redundant clouds: Making your service deployment truly reliable. In 9th Workshop on Hot Topics in Dependable Systems (HotDep), November 2013.
    • (2013) 9th Workshop on Hot Topics in Dependable Systems
    • Zhai, E.1    Chen, R.2    Wolinsky, D.I.3    Ford, B.4
  • 75
    • 84889006767 scopus 로고    scopus 로고
    • Technical Department of Computer Science, Yale University, accessed on Sep 9, 2014
    • Ennan Zhai, David Isaac Wolinsky, Hongda Xiao, Hongqiang Liu, Xueyuan Su, and Bryan Ford. Auditing the structural reliability of the clouds. Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale University, 2014. Available at http://cpsc.yale.edu/sites/default/files/files/tr1479. pdf, accessed on Sep 9, 2014.
    • (2014) Auditing the Structural Reliability of the Clouds
    • Zhai, E.1    Wolinsky, D.I.2    Xiao, H.3    Liu, H.4    Su, X.5    Ford, B.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.