A differential game-theoretic model of auditing for data storage in cloud computing
暂无分享,去创建一个
Zhi Li | Yanzhu Liu | Zhi Li | Yanzhu Liu
[1] Sachin Shetty,et al. Auditing and analysis of network traffic in cloud environment , 2014, Int. J. Bus. Process. Integr. Manag..
[2] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[3] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[4] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[5] Massimo Ficco. Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..
[6] Li Xu,et al. Batch public auditing for distributed mobile cloud computing , 2015, Int. J. High Perform. Comput. Netw..
[7] Cong Wang,et al. Enabling Cloud Storage Auditing With Key-Exposure Resistance , 2015, IEEE Transactions on Information Forensics and Security.
[8] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Quanyan Zhu,et al. Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.
[10] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[13] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[14] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[15] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[16] David W. K. Yeung,et al. Cooperative Stochastic Differential Games , 2005 .
[17] Klaus Zaerens,et al. Gaining the profits of cloud computing in a public authority environment , 2012, Int. J. Comput. Sci. Eng..
[18] Antonio Puliafito,et al. Managing volunteer resources in the cloud , 2013, Int. J. Comput. Sci. Eng..
[19] Wen-Guey Tzeng,et al. Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems , 2014, 2014 Eighth International Conference on Software Security and Reliability.