-
1
-
-
77950347409
-
Above the clouds: A Berkeley view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
77953318836
-
-
Jun.
-
S. Wilson, (2008, Jun.). Appengine outage [Online]. Available: http://www.cioweb- log.com/50226711/appengine outage.php
-
(2008)
Appengine Outage [Online]
-
-
Wilson, S.1
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. 14th ACMConf. Comput. Commun. Security, 2007, pp. 598-609.
-
(2007)
Proc. 14th ACMConf. Comput. Commun. Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
70350389843
-
Enabling public verifiability and data dynamic for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamic for storage security in cloud computing," in Proc. 14th Eur. Symp. Res. Comput. Security, 2009, pp. 355-370.
-
(2009)
Proc. 14th Eur. Symp. Res. Comput. Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
8
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., 2010, pp. 525-533.
-
(2010)
Proc. 29th Annu. IEEE Int. Conf. Comput. Commun.
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
9
-
-
79959319539
-
-
Rep. 2010/234, Cryptology ePrint Archive
-
Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau, "Cooperative provable data possession," Rep. 2010/234, Cryptology ePrint Archive, 2010.
-
(2010)
Cooperative Provable Data Possession
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
10
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans. Inf. Syst. Security, vol. 14, no. 1, pp. 12-34, 2011.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
, pp. 12-34
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
11
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Oct.-Dec.
-
H. Wang, "Proxy provable data possession in public clouds," IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
13
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K.D. Bowers, A. Jules, and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 187-198.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 187-198
-
-
Bowers, K.D.1
Jules, A.2
Oprea, A.3
-
14
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote data checking for network coding-based distributed storage systems," in Proc. ACM Workshop Cloud Comput. Security, 2010, pp. 31-42.
-
(2010)
Proc. ACM Workshop Cloud Comput. Security
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
15
-
-
79960836433
-
Zero-knowledge proofs of retrievability
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, and H. Hu, "Zero-knowledge proofs of retrievability," Sci. China: Inf. Sci., vol. 54, no. 8, pp. 1608-1617, 2011.
-
(2011)
Sci. China: Inf. Sci.
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
-
16
-
-
84861630520
-
LT codes-based secure and reliable cloud storage service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, "LT codes-based secure and reliable cloud storage service," in Proc. 31st Annu. IEEE Int. Conf. Comput. Commun., 2012, pp. 693-701.
-
(2012)
Proc. 31st Annu. IEEE Int. Conf. Comput. Commun.
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
17
-
-
84874339819
-
Enabling data integrity protection in regenerating-coding-based cloud storage
-
H. C. H. Chen and P. P. C. Lee, "Enabling data integrity protection in regenerating-coding-based cloud storage," in Proc. 31st Int. Symp. Reliable Distrib. Syst., 2012, pp. 51-60.
-
(2012)
Proc. 31st Int. Symp. Reliable Distrib. Syst.
, pp. 51-60
-
-
Chen, H.C.H.1
Lee, P.P.C.2
-
18
-
-
84874925278
-
Towards self-repairing replicationbased storage systems using untrusted clouds
-
B. Chen and R. Curtmola, "Towards self-repairing replicationbased storage systems using untrusted clouds," in Proc. 3rd ACM Conf. Data Appl. Security Privacy, 2013, pp. 377-388.
-
(2013)
Proc. 3rd ACM Conf. Data Appl. Security Privacy
, pp. 377-388
-
-
Chen, B.1
Curtmola, R.2
-
19
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
20
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
23
-
-
84866397408
-
-
Rep. 2011/585, Cryptology ePrint Archive
-
E. Stefanov, M. V. Dijk, A. Oprea, and A. Jules, "Iris: A scalable cloud file system with efficient integrity checks," Rep. 2011/585, Cryptology ePrint Archive, 2011.
-
(2011)
Iris: A Scalable Cloud File System with Efficient Integrity Checks
-
-
Stefanov, E.1
Dijk, M.V.2
Oprea, A.3
Jules, A.4
-
24
-
-
84883411598
-
Dynamic proofs of retrievability via oblivious ram
-
D. Cash, A. Kupcu, and D. Wichs, "Dynamic proofs of retrievability via oblivious ram," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 279-295.
-
(2013)
Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 279-295
-
-
Cash, D.1
Kupcu, A.2
Wichs, D.3
-
25
-
-
85077127142
-
NCCloud: Applying network coding for the storage repair in a cloudof- clouds
-
Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, "NCCloud: Applying network coding for the storage repair in a cloudof- clouds," in Proc. 10th USENIX Conf. File Storage Technol., 2012, pp. 265-273.
-
(2012)
Proc. 10th USENIX Conf. File Storage Technol.
, pp. 265-273
-
-
Hu, Y.1
Chen, H.C.H.2
Lee, P.P.C.3
Tang, Y.4
-
26
-
-
77955726417
-
Network coding for distributed storage systems
-
Sep.
-
A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539-4551, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wu, Y.3
Wainwright, M.J.4
Ramchandran, K.5
-
27
-
-
77955043127
-
Asymmetric group key agreement
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. D. Ferrer, "Asymmetric group key agreement," in Proc. 28th Annu. Int. Conf. Theory Appl. Cryptography Techn., 2009, pp. 153-170.
-
(2009)
Proc. 28th Annu. Int. Conf. Theory Appl. Cryptography Techn.
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Ferrer, J.D.5
-
29
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," J. Soc. Ind. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
-
(1960)
J. Soc. Ind. Appl. Math.
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
30
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|