Trusting the cloud
暂无分享,去创建一个
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[3] Idit Keidar,et al. Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[4] Leslie Lamport,et al. How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs , 2016, IEEE Transactions on Computers.
[5] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[6] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[7] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[8] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[9] David Mazières,et al. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems , 2007, NSDI.
[10] Abhi Shelat,et al. Efficient fork-linearizable access to untrusted shared memory , 2007, PODC '07.
[11] Jeffrey S. Chase,et al. Strong accountability for network storage , 2007, TOS.
[12] Maurice Herlihy,et al. Wait-free synchronization , 1991, TOPL.
[13] Maurice Herlihy,et al. Linearizability: a correctness condition for concurrent objects , 1990, TOPL.
[14] Idit Keidar,et al. Byzantine disk paxos: optimal resilience with byzantine shared memory , 2004, PODC '04.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[16] Michael K. Reiter,et al. Low-overhead byzantine fault-tolerant storage , 2007, SOSP.
[17] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[18] Scott Shenker,et al. Attested append-only memory: making adversaries stick to their word , 2007, SOSP.
[19] Manuel Blum,et al. Checking the correctness of memories , 2005, Algorithmica.
[20] Dennis Shasha,et al. Building secure file systems out of byzantine storage , 2002, PODC '02.
[21] Flaviu Cristian,et al. Fail-awareness in timed asynchronous systems , 1996, PODC '96.
[22] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[23] Michael K. Reiter,et al. On Consistency of Encrypted Files , 2006, DISC.
[24] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[25] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[26] Idit Keidar,et al. Fork sequential consistency is blocking , 2009, Inf. Process. Lett..
[27] Mustaque Ahamad,et al. Slow memory: weakening consistency to enhance concurrency in distributed shared memories , 1990, Proceedings.,10th International Conference on Distributed Computing Systems.
[28] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[29] BirmanKen,et al. Toward a cloud computing research agenda , 2009 .
[30] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.