Author:
Chang Tao-Ku,Lu Cheng-Yen
Publisher
Springer International Publishing
Reference11 articles.
1. Feng, J., Chen, Y., Summerville, D., Ku, W.-S., Su, Z.: Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. In: 8th IEEE Consumer Communications and Networking Conference (CCNC), pp. 521–522 (2011)
2. Shraer, A., Keidar, I., Cachin, C., Michalevsky, Y., Cidon, A., Shaket, D.: Venus: verification for untrusted cloud storage. In: 17th ACM Cloud Computing Security Workshop (CCSW) (2010)
3. Shah, M.A., Baker, M., Mogul, J., Swaminathan, R: Auditing to keep online storage services honest. In: USENIX HotOS XI: 11st Workshop on Hot Topics in Operating Systems (2007)
4. Li, J., Krohn, M., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: USENIX 6th Symposium on Operating Systems Design and Implementation (OSDI 2004) (2004)
5. Mazières, D., Shasha, D.: Building secure file systems out of Byzantine storage. In: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 108–117 (2002)