메뉴 건너뛰기




Volumn , Issue , 2009, Pages

The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; DURABILITY; NETWORK SECURITY;

EID: 85180620765     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (69)
  • 3
    • 85180631745 scopus 로고    scopus 로고
    • Amazon Web Services. Online at
    • Amazon Web Services. Online at http://aws.amazon.com.
  • 4
    • 77957936026 scopus 로고    scopus 로고
    • Online at
    • Google App Engine. Online at http://code.google.com/.
    • Google App Engine
  • 7
    • 85180620773 scopus 로고    scopus 로고
    • MySQL. Online at
    • MySQL. Online at http://www.mysql.com/.
  • 8
    • 85180635483 scopus 로고    scopus 로고
    • Opendb.com Web Database Hosting. Online at
    • Opendb.com Web Database Hosting. Online at http://www.opendb.com.
  • 9
    • 78649625398 scopus 로고    scopus 로고
    • Online at
    • Sun Utility Computing. Online at http://www.sun.com/service/sungrid/index.jsp.
    • Sun Utility Computing
  • 10
    • 85180541500 scopus 로고    scopus 로고
    • Online at
    • Yahoo Briefcase. Online at http://briefcase.yahoo.com.
    • Yahoo Briefcase
  • 12
    • 12444316237 scopus 로고
    • 1819 L Street, NW, Washington, DC 20036, USA. ANSI X3.135-1992 Database Language SQL
    • American National Standard for Information Systems, 1819 L Street, NW, Washington, DC 20036, USA. ANSI X3.135-1992 – Database Language SQL, 1992.
    • (1992) American National Standard for Information Systems
  • 15
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422–426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B. H.1
  • 17
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.
    • (2003) EuroCrypt
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 20
    • 34748812366 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Cryptology ePrint Archive, Report 2004/051
    • Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, 2004. http://eprint.iacr.org/.
    • (2004)
    • Chang, Y.1    Mitzenmacher, M.2
  • 26
    • 70349279685 scopus 로고    scopus 로고
    • Gartner, Inc. Technical report, Gartner Group/Dataquest
    • Gartner, Inc. Server Storage and RAID Worldwide. Technical report, Gartner Group/Dataquest, 1999. www.gartner.com.
    • (1999) Server Storage and RAID Worldwide
  • 28
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • Cryptology ePrint Archive, Report 2003/216
    • E. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
    • (2003)
    • Goh, E.1
  • 30
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Springer-Verlag; Lecture Notes in Computer Science 3089
    • P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Proceedings of ACNS, pages 31–45. Springer-Verlag; Lecture Notes in Computer Science 3089, 2004.
    • (2004) Proceedings of ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 46
    • 0141684090 scopus 로고
    • Using Write Protected Data Structures to Improve Software Fault Tolerance in Highly Available Database Management Systems
    • M. Sullivan and M. Stonebraker. Using Write Protected Data Structures to Improve Software Fault Tolerance in Highly Available Database Management Systems. In Proceedings of VLDB, 1991.
    • (1991) Proceedings of VLDB
    • Sullivan, M.1    Stonebraker, M.2
  • 48
    • 34548160016 scopus 로고    scopus 로고
    • Authentication of Outsourced Databases using Signature Aggregation and Chaining
    • Maithili Narasimha and Gene Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.
    • (2006) Proceedings of DASFAA
    • Narasimha, Maithili1    Tsudik, Gene2
  • 52
    • 34748840535 scopus 로고    scopus 로고
    • StegFS: A Steganographic File System for Linux
    • A. D. McDonald and M. G. Kuhn. StegFS: A Steganographic File System for Linux. In Information Hiding, pages 462–477, 1999.
    • (1999) Information Hiding , pp. 462-477
    • McDonald, A. D.1    Kuhn, M. G.2
  • 54
    • 4244084593 scopus 로고    scopus 로고
    • Microsoft Research. Technical report, Microsoft Corporation, July
    • Microsoft Research. Encrypting File System for Windows 2000. Technical report, Microsoft Corporation, July 1999. www.microsoft.com/windows2000/techinfo/howitworks/ security/encrypt.asp.
    • (1999) Encrypting File System for Windows 2000
  • 58
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
    • (1999) Proceedings of EuroCrypt
    • Paillier, P.1
  • 65
    • 33244473885 scopus 로고    scopus 로고
    • Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May
    • G. Sivathanu, C. P. Wright, and E. Zadok. Enhancing File System Integrity Through Check-sums. Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May 2004. www.fsl.cs.sunysb.edu/docs/nc-checksum-tr/nc-checksum.pdf.
    • (2004) Enhancing File System Integrity Through Check-sums
    • Sivathanu, G.1    Wright, C. P.2    Zadok, E.3
  • 69
    • 27144515662 scopus 로고    scopus 로고
    • NCryptfs: A Secure and Convenient Cryptographic File System
    • San Antonio, TX, June USENIX Association
    • C. P. Wright, M. Martino, and E. Zadok. NCryptfs: A Secure and Convenient Cryptographic File System. In Proceedings of the Annual USENIX Technical Conference, pages 197–210, San Antonio, TX, June 2003. USENIX Association.
    • (2003) Proceedings of the Annual USENIX Technical Conference , pp. 197-210
    • Wright, C. P.1    Martino, M.2    Zadok, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.