-
2
-
-
85165481426
-
-
Netflix. https://signup.netflix.com/.
-
-
-
-
3
-
-
36949029788
-
Towards Highly Reliable Enterprise Network Services Via Inference of Multi-level Dependencies
-
P. Bahl, R. Chandra, A. G. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang. Towards Highly Reliable Enterprise Network Services Via Inference of Multi-level Dependencies. In SIGCOMM, pages 13-24, 2007.
-
(2007)
SIGCOMM
, pp. 13-24
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.G.3
Kandula, S.4
Maltz, D.A.5
Zhang, M.6
-
4
-
-
84866635679
-
Robust Data Sharing with Key-Value Stores
-
C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolic, and I. Zachevsky. Robust Data Sharing with Key-Value Stores. In DSN, pages 1-12, 2012.
-
(2012)
DSN
, pp. 1-12
-
-
Basescu, C.1
Cachin, C.2
Eyal, I.3
Haas, R.4
Sorniotti, A.5
Vukolic, M.6
Zachevsky, I.7
-
5
-
-
79955971286
-
DepSky: Dependable and Secure Storage in a Cloud-of-clouds
-
A. N. Bessani, M. P. Correia, B. Quaresma, F. André, and P. Sousa. DepSky: Dependable and Secure Storage in a Cloud-of-clouds. In EuroSys, pages 31-46, 2011.
-
(2011)
EuroSys
, pp. 31-46
-
-
Bessani, A.N.1
Correia, M.P.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
6
-
-
77954911824
-
A Self-organized, Fault-tolerant and Scalable Replication Scheme for Cloud Storage
-
N. Bonvin, T. G. Papaioannou, and K. Aberer. A Self-organized, Fault-tolerant and Scalable Replication Scheme for Cloud Storage. In SoCC, 2010.
-
(2010)
SoCC
-
-
Bonvin, N.1
Papaioannou, T.G.2
Aberer, K.3
-
7
-
-
80052176388
-
-
Technical Report RZ3783, IBM Research, Zurich, Available at
-
C. Cachin, R. Haas, and M. Vukolic. Dependable Storage in the Intercloud. Technical Report RZ3783, IBM Research, Zurich, 2010. Available at http://domino.research.ibm.com/library/cyberdig.nsf/papers/ 630549C46339936C852577C200291E78/$File/rz3783.pdf.
-
(2010)
Dependable Storage in the Intercloud
-
-
Cachin, C.1
Haas, R.2
Vukolic, M.3
-
8
-
-
84883271186
-
SplitX: High-Performance Private Analytics
-
R. Chen, I. E. Akkus, and P. Francis. SplitX: High-Performance Private Analytics. In SIGCOMM, pages 315-326, 2013.
-
(2013)
SIGCOMM
, pp. 315-326
-
-
Chen, R.1
Akkus, I.E.2
Francis, P.3
-
9
-
-
85076921594
-
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
-
X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. In OSDI, pages 117-130, 2008.
-
(2008)
OSDI
, pp. 117-130
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
11
-
-
85088776320
-
Icebergs in the Clouds: The Other Risks of Cloud Computing
-
B. Ford. Icebergs in the Clouds: the Other Risks of Cloud Computing. In HotCloud, 2012.
-
(2012)
HotCloud
-
-
Ford, B.1
-
12
-
-
85076902294
-
Availability in Globally Distributed Storage Systems
-
D. Ford, F. Labelle, F. I. Popovici, M. Stokely, V.-A. Truong, L. Barroso, C. Grimes, and S. Quinlan. Availability in Globally Distributed Storage Systems. In OSDI, pages 61-74, 2010.
-
(2010)
OSDI
, pp. 61-74
-
-
Ford, D.1
Labelle, F.2
Popovici, F.I.3
Stokely, M.4
Truong, V.-A.5
Barroso, L.6
Grimes, C.7
Quinlan, S.8
-
13
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT, pages 1-19, 2004.
-
(2004)
EUROCRYPT
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
78149302156
-
CloudWard Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud
-
M. Y. Hajjat, X. Sun, Y.-W. E. Sung, D. A. Maltz, S. G. Rao, K. Sripanidkulchai, and M. Tawarmalani. CloudWard Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. In SIGCOMM, pages 243-254, 2010.
-
(2010)
SIGCOMM
, pp. 243-254
-
-
Hajjat, M.Y.1
Sun, X.2
Sung, Y.-W.E.3
Maltz, D.A.4
Rao, S.G.5
Sripanidkulchai, K.6
Tawarmalani, M.7
-
15
-
-
70450270822
-
Detailed Diagnosis in Enterprise Networks
-
S. Kandula, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye, and P. Bahl. Detailed Diagnosis in Enterprise Networks. In SIGCOMM, pages 243-254, 2009.
-
(2009)
SIGCOMM
, pp. 243-254
-
-
Kandula, S.1
Mahajan, R.2
Verkaik, P.3
Agarwal, S.4
Padhye, J.5
Bahl, P.6
-
16
-
-
33745160750
-
Privacy-Preserving Set Operations
-
L. Kissner and D. X. Song. Privacy-Preserving Set Operations. In CRYPTO, pages 241-257, 2005.
-
(2005)
CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
17
-
-
78650877494
-
CloudCmp: Comparing Public Cloud Providers
-
A. Li, X. Yang, S. Kandula, and M. Zhang. CloudCmp: Comparing Public Cloud Providers. In IMC, pages 1-14, 2010.
-
(2010)
IMC
, pp. 1-14
-
-
Li, A.1
Yang, X.2
Kandula, S.3
Zhang, M.4
-
19
-
-
85101166294
-
Emergent (Mis)behavior vs. Complex Software Systems
-
J. C. Mogul. Emergent (Mis)behavior vs. Complex Software Systems. In EuroSys, pages 293-304, 2006.
-
(2006)
EuroSys
, pp. 293-304
-
-
Mogul, J.C.1
-
20
-
-
84961845240
-
DJoin: Differentially Private Join Queries over Distributed Databases
-
A. Narayan and A. Haeberlen. DJoin: Differentially Private Join Queries over Distributed Databases. In OSDI, 2012.
-
(2012)
OSDI
-
-
Narayan, A.1
Haeberlen, A.2
-
21
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT, pages 223-238, 1999.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
85017487069
-
The Seven Deadly Sins of Cloud Computing Research
-
M. Schwarzkopf, D. G. Murray, and S. Hand. The Seven Deadly Sins of Cloud Computing Research. In HotCloud, 2012.
-
(2012)
HotCloud
-
-
Schwarzkopf, M.1
Murray, D.G.2
Hand, S.3
-
27
-
-
80051900624
-
A Cost-Aware Elasticity Provisioning System for the Cloud
-
U. Sharma, P. Shenoy, S. Sahu, and A. Shaikh. A Cost-Aware Elasticity Provisioning System for the Cloud. In ICDCS, pages 559-570, 2011.
-
(2011)
ICDCS
, pp. 559-570
-
-
Sharma, U.1
Shenoy, P.2
Sahu, S.3
Shaikh, A.4
-
29
-
-
70349753672
-
Benchmarking Amazon EC2 for High-Performance Scientific Computing
-
E. Walker. Benchmarking Amazon EC2 for High-Performance Scientific Computing. USENIX Login, 33(5):18-23, 2008.
-
(2008)
USENIX Login
, vol.33
, Issue.5
, pp. 18-23
-
-
Walker, E.1
-
30
-
-
84861959172
-
Privacy-Preserving Public Auditing for Secure Cloud Storage
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers, 62(2):362-375, 2013.
-
(2013)
IEEE Trans. Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
31
-
-
77954843911
-
Toward Publicly Auditable Secure Cloud Data Storage Services
-
C. Wang, K. Ren, W. Lou, and J. Li. Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4):19-24, 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
32
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM, pages 525-533, 2010.
-
(2010)
INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
33
-
-
79953294892
-
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst., 22(5):847-859, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
34
-
-
85072781406
-
Orchestrating the Deployment of Computations in the Cloud with Conductor
-
A. Wieder, P. Bhatotia, A. Post, and R. Rodrigues. Orchestrating the Deployment of Computations in the Cloud with Conductor. In NSDI, 2012.
-
(2012)
NSDI
-
-
Wieder, A.1
Bhatotia, P.2
Post, A.3
Rodrigues, R.4
-
35
-
-
84866516842
-
NetPilot: Automating Datacenter Network Failure Mitigation
-
X. Wu, D. Turner, C.-C. Chen, D. A. Maltz, X. Yang, L. Yuan, and M. Zhang. NetPilot: Automating Datacenter Network Failure Mitigation. In SIGCOMM, pages 419-430, 2012.
-
(2012)
SIGCOMM
, pp. 419-430
-
-
Wu, X.1
Turner, D.2
Chen, C.-C.3
Maltz, D.A.4
Yang, X.5
Yuan, L.6
Zhang, M.7
-
36
-
-
84889073577
-
Structural Cloud Audits that Protect Private Information
-
H. Xiao, B. Ford, and J. Feigenbaum. Structural Cloud Audits that Protect Private Information. In CCSW, 2013.
-
(2013)
CCSW
-
-
Xiao, H.1
Ford, B.2
Feigenbaum, J.3
-
37
-
-
84858284080
-
Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities
-
K. Yang and X. Jia. Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities. World Wide Web, 15(4):409-428, 2012.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
38
-
-
0020312165
-
Protocols for Secure Computations (Extended Abstract)
-
A. C.-C. Yao. Protocols for Secure Computations (Extended Abstract). In FOCS, pages 160-164, 1982.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
39
-
-
84889006767
-
-
Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale University, Available at
-
E. Zhai, D. I. Wolinsky, H. Xiao, H. Liu, X. Su, and B. Ford. Auditing the Structural Reliability of the Clouds. Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale University, 2013. Available at http://www.cs.yale.edu/homes/zhai-ennan/sra.pdf.
-
(2013)
Auditing the Structural Reliability of the Clouds
-
-
Zhai, E.1
Wolinsky, D.I.2
Xiao, H.3
Liu, H.4
Su, X.5
Ford, B.6
|