TerraCheck: Verification of Dedicated Cloud Storage
暂无分享,去创建一个
[1] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[2] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[3] Alexander W. Dent,et al. The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model , 2006, IACR Cryptol. ePrint Arch..
[4] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[5] Eugene H. Spafford,et al. OPUS: Preventing weak password choices , 1992, Comput. Secur..
[6] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[7] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[8] Zhenyu Wu,et al. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[9] Robert Haas,et al. A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds , 2011, Middleware.
[10] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[11] Golden G. Richard,et al. Scalpel: A Frugal, High Performance File Carver , 2005, DFRWS.
[12] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[13] Sushil Jajodia,et al. Disk storage isolation and verification in cloud , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[14] V. Piuri,et al. Fault tolerance management in IaaS clouds , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[15] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[16] Benjamin Farley,et al. Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) , 2012, CCS.
[17] Hovav Shacham,et al. Do you know where your cloud files are? , 2011, CCSW '11.
[18] Ronald L. Rivest,et al. How to tell if your cloud files are vulnerable to drive crashes , 2011, CCS '11.
[19] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[20] Ronald L. Rivest,et al. Hourglass schemes: how to prove that cloud files are encrypted , 2012, CCS.