Secure Collaborative Integrity Verification for Hybrid Cloud Environments
暂无分享,去创建一个
Gail-Joon Ahn | Hongxin Hu | Di Ma | Shan-Biao Wang | Yan Zhu | Gail-Joon Ahn | Hongxin Hu | Di Ma | Yan Zhu | Shan-Biao Wang
[1] Gail-Joon Ahn,et al. Zero-knowledge proofs of retrievability , 2011, Science China Information Sciences.
[2] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[3] Gail-Joon Ahn,et al. Collaborative integrity verification in hybrid clouds , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[4] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[5] Emin Gün Sirer,et al. The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.
[6] Hung-Min Sun,et al. A Study of User-Friendly Hash Comparison Schemes , 2009, 2009 Annual Computer Security Applications Conference.
[7] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[8] Jeffrey S. Chase,et al. Strong accountability for network storage , 2007, TOS.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[11] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[12] Emin Gün Sirer,et al. The design and implementation of a next generation name service for the internet , 2004, SIGCOMM.
[13] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[16] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[17] Geoffrey C. Fox,et al. Granules: A lightweight, streaming runtime for cloud computing with support, for Map-Reduce , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.
[18] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[19] GhemawatSanjay,et al. The Google file system , 2003 .
[20] Howard Gobioff,et al. The Google file system , 2003, SOSP '03.
[21] Jeffrey S. Chase,et al. Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications , 2011, CCSW '11.
[22] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[23] Indranil Gupta,et al. On Availability of Intermediate Data in Cloud Computations , 2009, HotOS.
[24] Arun Venkataramani,et al. Consensus Routing: The Internet as a Distributed System. (Best Paper) , 2008, NSDI.
[25] Lance Fortnow,et al. On the Power of Multi-Prover Interactive Protocols , 1994, Theor. Comput. Sci..
[26] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[27] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[28] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.