On cloud storage and the cloud of clouds approach
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[2] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[3] Matthew Green,et al. Access controls for oblivious and anonymous systems , 2011, TSEC.
[4] Daniel Slamanig. Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper) , 2012, Financial Cryptography.
[5] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[6] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[7] Daniel Slamanig. Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources , 2011, Selected Areas in Cryptography.
[8] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[9] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[10] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[13] Mihir Bellare,et al. Robust computational secret sharing and a unified account of classical secret-sharing goals , 2007, CCS '07.
[14] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[15] Stefan Katzenbeisser,et al. Oblivious Outsourced Storage with Delegation , 2011, Financial Cryptography.
[16] Jan Camenisch,et al. Oblivious Transfer with Hidden Access Control Policies , 2011, Public Key Cryptography.
[17] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[18] Brian Warner,et al. Tahoe: the least-authority filesystem , 2008, StorageSS '08.
[19] Marten van Dijk,et al. Iris: a scalable cloud file system with efficient integrity checks , 2012, ACSAC '12.
[20] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[21] Josef Spillner,et al. Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[22] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[23] Tobias Pulls. (More) Side Channels in Cloud Storage - Linking Data to Users , 2011, PrimeLife.
[24] Tobias Pulls. Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency Tool , 2012, NordSec.
[25] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[26] Steven M. Bellovin,et al. Privacy Enhanced Access Control for Outsourced Data Sharing , 2012, Financial Cryptography.
[27] Radu Sion,et al. Oblivious remote data access made practical , 2012 .
[28] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX Annual Technical Conference.
[29] Idit Keidar,et al. Venus: verification for untrusted cloud storage , 2010, CCSW '10.
[30] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[31] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[32] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[33] Femi G. Olumofin. Practical Private Information Retrieval , 2011 .
[34] Marko Vukolic,et al. Robust data sharing with key-value stores , 2011, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[35] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[36] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.