On securing untrusted clouds with cryptography
暂无分享,去创建一个
[1] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[2] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[3] GhemawatSanjay,et al. The Google file system , 2003 .
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Alexandra Boldyreva,et al. Provably-Secure Schemes for Basic Query Support in Outsourced Databases , 2007, DBSec.
[6] Erez Zadok,et al. I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System , 2004, LISA.
[7] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[8] James R. Hamilton,et al. On Designing and Deploying Internet-Scale Services , 2007, LISA.
[9] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[10] TsudikGene,et al. Authentication and integrity in outsourced databases , 2006 .
[11] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[12] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[13] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[14] Erez Zadok,et al. Enhancing File System Integrity Through Checksums , 2004 .
[15] G. Sahoo,et al. A Secure Cloud Computing , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[16] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[17] Gene Tsudik,et al. Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.
[18] Stanley B. Zdonik,et al. Answering Aggregation Queries in a Secure System Model , 2007, VLDB.
[19] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[20] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[21] Radu Sion,et al. To cloud or not to cloud?: musings on costs and viability , 2011, SOCC '11.
[22] Gene Tsudik,et al. Signature Bouquets: Immutability for Aggregated/Condensed Signatures , 2004, ESORICS.
[23] William J. Bolosky,et al. A large-scale study of file-system contents , 1999, SIGMETRICS '99.
[24] Mikhail J. Atallah,et al. Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[25] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[26] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[27] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[28] Amin Vahdat,et al. A scalable, commodity data center network architecture , 2008, SIGCOMM '08.
[29] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[30] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[31] Jacob R. Lorch,et al. A five-year study of file-system metadata , 2007, TOS.