Author:
Wei Lifei,Zhu Haojin,Cao Zhenfu,Dong Xiaolei,Jia Weiwei,Chen Yunlu,Vasilakos Athanasios V.
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference37 articles.
1. A view of cloud computing;Armbrust;Communications of the ACM,2010
2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Alexandria, Virginia, USA, October 28–31, 2007.
3. G. Ateniese, R. Di Pietro, L. Mancini, G. Tsudik, Scalable and efficient provable data possession, in: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22–26, 2008.
4. M. Belenkiy, M. Chase, C. Erway, J. Jannotti, A. Küpçü, A. Lysyanskaya, Incentivizing outsourced computation, in: Proceedings of the 3rd International Workshop on Economics of Networked Systems, Seattle, WA, USA, August 17–22, 2008.
5. A. Bialecki, M. Cafarella, D. Cutting, O. OMalley, Hadoop: A Framework for Running Applications on Large Clusters Built of Commodity Hardware. .
Cited by
364 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献