Author:
Yu Yong,Zhang Yafang,Ni Jianbing,Au Man Ho,Chen Lanxiang,Liu Hongyu
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference27 articles.
1. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility;Buyyaa;Future Gener. Comput. Syst.,2009
2. Addressing cloud computing security issues;Zissis;Future Gener. Comput. Syst.,2012
3. G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J. Peterson, D. Song, Provable data possession at untrusted stores, in: Proceeding of ACM CCS’07, Alexandria, Virginia, USA, October 29–November 2, 2007, pp. 598–609.
4. Remote data checking using provable data possession;Ateniese;ACM Trans. Inf. Syst. Secur.,2011
5. A. Juels, B.S. Kaliski, PORs: proofs of retrievability for large files, in: Proceeding of ACM CCS’07, Alexandria, Virginia, USA, October 29–November 2, 2007, pp. 584–597.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献