Ensuring Data Integrity in Cloud Computing
暂无分享,去创建一个
[1] D. B. Davis,et al. Sun Microsystems Inc. , 1993 .
[2] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[3] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[4] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[5] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[6] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[7] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[8] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[9] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[10] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[11] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[12] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[13] M. R. Spiegel. E and M , 1981 .
[14] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[15] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[16] Michael K. Reiter,et al. Space-Efficient Block Storage Integrity , 2005, NDSS.
[17] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[18] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[19] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[20] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[21] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[22] Prashant Srivastava,et al. An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[23] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[24] Shu Lin,et al. Error Control Coding , 2004 .
[25] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[26] Moni Naor,et al. The Complexity of Online Memory Checking , 2005, FOCS.
[27] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[28] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[29] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[30] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[31] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[32] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[33] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.