Managing Multi-Cloud Data Dependability Faults
暂无分享,去创建一个
[1] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[2] Simson L. Garfinkel,et al. An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .
[3] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[6] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[7] Eric Pardede,et al. A Byzantine Fault Tolerance Model for a Multi-cloud Computing , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.
[8] Priya Narasimhan,et al. Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).
[9] Eric Pardede,et al. A New approach using redundancy technique to improve security in cloud computing , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[10] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[11] Marko Vukolic,et al. The byzantine empire in the intercloud , 2010, SIGA.
[12] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[13] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[14] Sandeep Joshi,et al. A Comprehensive Report on Security and Privacy Challenges in Software as a Service , 2018 .
[15] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[16] Eric Pardede,et al. Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes , 2015, Int. J. Cloud Appl. Comput..
[17] Arun Venkataramani,et al. Separating agreement from execution for byzantine fault tolerant services , 2003, SOSP '03.
[18] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[19] Wei Li,et al. A framework to support survivable Web services , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[20] Ramakrishna Kotla,et al. Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.
[21] Mehedi Masud,et al. Byzantine Fault-Tolerant Architecture in Cloud Data Management , 2016, Int. J. Knowl. Soc. Res..
[22] K.Y.B. Williams,et al. Better Security and Encryption Within Cloud Computing Systems , 2018 .
[23] Simson L. Garfinkel,et al. Email-Based Identification and Authentication: An Alternative to PKI? , 2003, IEEE Secur. Priv..
[24] DahlinMike,et al. Separating agreement from execution for byzantine fault tolerant services , 2003 .
[25] Eric Pardede,et al. A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds , 2013, J. Softw..
[26] Wenbing Zhao,et al. BFT-WS: A Byzantine Fault Tolerance Framework for Web Services , 2007, 2007 Eleventh International IEEE EDOC Conference Workshop.
[27] Eric Pardede,et al. MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Petr Kuznetsov,et al. BFTW3: why? when? where? workshop on the theory and practice of byzantine fault tolerance , 2010, SIGA.