Cloud Storage and its Secure Overlay Techniques
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[2] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[3] M. Hemalatha,et al. Cloud Computing for Academic Environment , 2012 .
[4] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[5] Greg Schulz. Cloud and Virtual Data Storage Networking , 2011 .
[6] Yang Tang,et al. A Secure Cloud Backup System with Assured Deletion and Version Control , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[7] Nabil Sultan,et al. loud computing for education : A new dawn ? , 2009 .
[8] Ya Wang,et al. Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.
[9] Zhijie Lin,et al. Recent Advances in Cloud Storage , 2010 .
[10] Xiaodi Huang,et al. Cloud Computing for Higher Education: A roadmap , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[11] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[12] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[13] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[14] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[15] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.