Toward Shared Ownership in the Cloud
暂无分享,去创建一个
[1] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[2] Marcos K. Aguilera,et al. Using erasure codes efficiently for storage in a distributed system , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[3] Anand Desai,et al. The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search , 2000, CRYPTO.
[4] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[5] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[6] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[7] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[8] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[9] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[10] Angelos D. Keromytis,et al. Trust management for IPsec , 2002, TSEC.
[11] Yuri Gurevich,et al. DKAL: Distributed-Knowledge Authorization Language , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[12] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[13] Mihir Bellare,et al. Robust computational secret sharing and a unified account of classical secret-sharing goals , 2007, CCS '07.
[14] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[15] Hubert Ritzdorf,et al. Commune: Shared Ownership in an Agnostic Cloud , 2015, SACMAT.
[16] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[17] Letizia Tanca,et al. What you Always Wanted to Know About Datalog (And Never Dared to Ask) , 1989, IEEE Trans. Knowl. Data Eng..
[18] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[19] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[20] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[21] Ronald L. Rivest,et al. Hourglass schemes: how to prove that cloud files are encrypted , 2012, CCS.
[22] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Victor Boyko,et al. On the Security Properties of OAEP as an All-or-Nothing Transform , 1999, CRYPTO.
[25] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[26] Ghassan O. Karame,et al. Transparent Data Deduplication in the Cloud , 2015, CCS.
[27] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[28] Andrew D. Gordon,et al. SecPAL: Design and semantics of a decentralized authorization language , 2010, J. Comput. Secur..
[29] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[30] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[31] Michael K. Reiter,et al. Fault-scalable Byzantine fault-tolerant services , 2005, SOSP '05.
[32] Huaxia Xia,et al. RobuSTore: a distributed storage architecture with robust and high performance , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).
[33] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[34] Josef Pieprzyk,et al. Conditionally secure secret sharing schemes with disenrollment capability , 1994, CCS '94.
[35] Ghassan O. Karame,et al. Outsourced Proofs of Retrievability , 2014, CCS.