Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference71 articles.
1. Soares, L.F.B., Fernandes, D.A.B., Freire, M.M., Inacio, P.R.M.: Secure user authentication in cloud computing management interfaces. In: IEEE 32nd International Performance Computing and Communications Conference (IPCCC), pp 1–2 (2013)
2. Wilcox-O’Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: StorageSS, pp. 21–26 (2008)
3. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: 16th ACM Conference on Computer and Communications Security, CCS ’09. ACM, pp. 187–198 (2009)
4. Popa, R.A., Lorch, J., Molnar, D., Wang, H.J., Zhuang, L.: Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (USENIX) (2011)
5. Shraer, A., Cachin, C., Cidon, A., Keidar, I., Michalevsky, Y., Shaket, D.: Venus: verification for untrusted cloud storage. In: CCSW, pp. 19–30 (2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献