Linearizability: a correctness condition for concurrent objects
ACM Transactions on Programming Languages and Systems (TOPLAS)
Managing update conflicts in Bayou, a weakly connected replicated storage system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Fail-awareness in timed asynchronous systems
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Building secure file systems out of byzantine storage
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Distributed Computing
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Efficient fork-linearizable access to untrusted shared memory
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Strong accountability for network storage
ACM Transactions on Storage (TOS)
Low-overhead byzantine fault-tolerant storage
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Attested append-only memory: making adversaries stick to their word
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs
IEEE Transactions on Computers
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Proceedings of the 15th ACM conference on Computer and communications security
Fork sequential consistency is blocking
Information Processing Letters
Toward a cloud computing research agenda
ACM SIGACT News
Beyond one-third faulty replicas in byzantine fault tolerant systems
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
On consistency of encrypted files
DISC'06 Proceedings of the 20th international conference on Distributed Computing
A case for the accountable cloud
ACM SIGOPS Operating Systems Review
The byzantine empire in the intercloud
ACM SIGACT News
Toward risk assessment as a service in cloud environments
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
The smart internet as a catalyst for health care reform
The smart internet
The smart internet as a catalyst for health care reform
The smart internet
Secure virtualization for cloud computing
Journal of Network and Computer Applications
The complexity of robust atomic storage
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
A secure and efficient role-based access policy towards cryptographic cloud storage
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Silverline: toward data confidentiality in storage-intensive cloud applications
Proceedings of the 2nd ACM Symposium on Cloud Computing
Designing a secure storage repository for sharing scientific datasets using public clouds
Proceedings of the second international workshop on Data intensive computing in the clouds
Trust beyond reputation: A computational trust model based on stereotypes
Electronic Commerce Research and Applications
A Decision Table for the Cloud Computing Decision in Small Business
Information Resources Management Journal
The technical security issues in cloud computing
International Journal of Information and Communication Technology
Hi-index | 0.00 |
More and more users store data in "clouds" that are accessed remotely over the Internet. We survey well-known cryptographic tools for providing integrity and consistency for data stored in clouds and discuss recent research in cryptography and distributed computing addressing these problems.