Review: The Secret Sharing Algorithms for Data Security in the Cloud
暂无分享,去创建一个
[1] Robert B. Ross,et al. Enabling active storage on parallel I/O software stacks , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[2] John A. Chandy,et al. Active storage using object-based devices , 2008, 2008 IEEE International Conference on Cluster Computing.
[3] Dan Feng,et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Yu Zhang,et al. An Active Storage System for High Performance Computing , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[6] S. Jaya Nirmala,et al. A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud , 2012, CloudCom 2012.
[7] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.
[8] Yulai Xie,et al. Design and evaluation of Oasis: An active storage framework based on T10 OSD standard , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).
[9] Dana N. Xu,et al. Design of an Intelligent Object-based Storage device , 2009 .
[10] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[11] Radia J. Perlman,et al. File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[12] Dan Feng,et al. Active Storage Framework for Object-based Storage Device , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).