Making secret sharing based cloud storage usable
暂无分享,去创建一个
Thomas Lorünser | John Sören Pettersson | Simone Fischer-Hübner | Erik Framner | Ala Sarah Alaqra | S. Fischer-Hübner | J. Pettersson | T. Lorünser | A. Alaqra | Erik Framner
[1] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[2] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[3] Rajkumar Buyya,et al. Brokering Algorithms for Optimizing the Availability and Cost of Cloud Storage Services , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[4] Sumit Goyal,et al. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .
[5] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[6] Salvatore Venticinque,et al. Multi-objective Decision Support for Brokering of Cloud SLA , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[7] Frank Leymann,et al. Decision Support for Application Migration to the Cloud - Challenges and Vision , 2013, CLOSER.
[8] Miguel Correia,et al. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud , 2013, Euro-Par Workshops.
[9] Mingqiang Li. On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes , 2012, ArXiv.
[10] Daniel Slamanig,et al. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[11] Frank Leymann,et al. CloudDSF - The Cloud Decision Support Framework for Application Migration , 2014, ESOCC.
[12] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[13] Jérôme Darmont,et al. Secret sharing for cloud data security: a survey , 2017, The VLDB Journal.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Yasser Albagory. Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations , 2014 .
[16] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[17] H. Nissenbaum. Can Trust be Secured Online? A theoretical perspective , 1999 .
[18] Siani Pearson,et al. Privacy Assurance Checking , 2011, Digital Privacy - PRIME.
[19] Adriano Bessa Albuquerque,et al. Cloudstep: A step-by-step decision process to support legacy application migration to the cloud , 2012, 2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA).
[20] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[21] Sai Manoj Pudukotai Dinakarrao,et al. A fast and resource efficient FPGA implementation of secret sharing for storage applications , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Thomas Lorünser,et al. The Archistar Secret-Sharing Backup Proxy , 2017, ARES.
[23] Victor Muntés-Mulero,et al. Towards a Method for Decision Support in Multi-cloud Environments , 2013, CLOUD 2013.
[24] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .
[25] Daniel Slamanig,et al. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).