共 11 条
[1]
Cloud Security Alliance.Security Guidance for Critical Areas of Focus in Cloud Computing. http://www.cloudsecurityalliance.org/guidance/csaguide.pdf . 2011
[2]
Ateniese G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores. Proc of CCS’’’’’’’’07 . 2007
[3]
Schwarz T,Ethan SJ,Miller L.Store,forget,and check:Using algebraic signatures to check remotely administered storage. Proc.of the 26th IEEE Int’l Conf.on Distributed Computing Systems . 2006
[4]
Juels A,Kaliski B.PORs:Proofs of retrievability for large files. Proc of the14th ACM Conf on Computer and Communications Security(CCS’07) . 2007
[5]
Plank J S,Ding Y.Note:Correction to the 1997 Tutorial onReed-Solomon Coding. CS-03-504 . 2003
[6]
K.D.Bowers,A.Juels,A Oprea.HAIL:A high-availability and integrity layer for cloud storage. . 2008
[7]
Hendricks J,Ganger G R,Reiter M K.Verifying Distributed Erasure-Coded Data. Proceedings of the 26th ACM Symposium on Prin-ciples of Distributed Computing . 2007
[8]
Wang Q,Ren K,Lou W,et al.Dependable and Secure Sensor DataStorage with Dynamic Integrity Assurance. INFOCOM 2009 . 2009
[9]
Lillibridge M,Elnikety S,Birrell A,et al.A Cooperative InternetBackup Scheme. Proc.of the 2003USENIX Annual Tech-nical Conference . 2003
[10]
G.Ateniese,R.D.Pietro,L.V.Mancini,G.Tsudik."Scalable and Efficient Provable Data Possession,". Proc.of SecureComm’08 . 2008