Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments
暂无分享,去创建一个
[1] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[2] Venkatachalam Chandrasekaran,et al. Similarity coefficient generators for network forensics , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[3] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[4] A. Kumar,et al. Space-code bloom filter for efficient per-flow traffic measurement , 2004, IEEE INFOCOM 2004.
[5] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[6] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[7] Joseph B. Gurman. How Many Terabytes Was That? Archiving and Serving Solar Space Data Without Losing Your Shirt , 1999 .
[8] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[9] Michael T. Goodrich,et al. Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.
[10] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[11] Alberto Polzonetti,et al. Cloud computing for network business ecosystem , 2010, 2010 IEEE International Conference on Industrial Engineering and Engineering Management.
[12] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[13] Michael T. Goodrich,et al. Athos: Efficient Authentication of Outsourced File Systems , 2008, ISC.
[14] Yixian Yang,et al. Cyclic redundancy code check algorithm based on small lookup table , 2009, 2009 IEEE International Conference on Communications Technology and Applications.
[15] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[16] Yongdae Kim,et al. On protecting integrity and confidentiality of cryptographic file system for outsourced storage , 2009, CCSW '09.