Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing (Englisch)
Freier Zugriff
- Neue Suche nach: Wang, Qian
- Neue Suche nach: Wang, Cong
- Neue Suche nach: Li, Jin
- Neue Suche nach: Ren, Kui
- Neue Suche nach: Lou, Wenjing
- Neue Suche nach: Wang, Qian
- Neue Suche nach: Wang, Cong
- Neue Suche nach: Li, Jin
- Neue Suche nach: Ren, Kui
- Neue Suche nach: Lou, Wenjing
In:
Computer Security – ESORICS 2009
3
;
355-370
;
2009
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
-
Beteiligte:Wang, Qian ( Autor:in ) / Wang, Cong ( Autor:in ) / Li, Jin ( Autor:in ) / Ren, Kui ( Autor:in ) / Lou, Wenjing ( Autor:in )
-
Erschienen in:Computer Security – ESORICS 2009 , 3 ; 355-370Lecture Notes in Computer Science ; 5789, 3 ; 355-370
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Learning More about the Underground Economy: A Case-Study of Keyloggers and DropzonesHolz, Thorsten / Engelberth, Markus / Freiling, Felix et al. | 2009
- 19
-
User-Centric Handling of Identity Agent CompromiseMashima, Daisuke / Ahamad, Mustaque / Kannan, Swagath et al. | 2009
- 37
-
The Coremelt AttackStuder, Ahren / Perrig, Adrian et al. | 2009
- 53
-
Type-Based Analysis of PIN Processing APIsCentenaro, Matteo / Focardi, Riccardo / Luccio, Flaminia L. / Steel, Graham et al. | 2009
- 69
-
Declassification with Explicit Reference PointsLux, Alexander / Mantel, Heiko et al. | 2009
- 86
-
Tracking Information Flow in Dynamic Tree StructuresRusso, Alejandro / Sabelfeld, Andrei / Chudnov, Andrey et al. | 2009
- 104
-
Lightweight Opportunistic Tunneling (LOT)Gilad, Yossi / Herzberg, Amir et al. | 2009
- 120
-
Hide and Seek in Time — Robust Covert Timing ChannelsLiu, Yali / Ghosal, Dipak / Armknecht, Frederik / Sadeghi, Ahmad-Reza / Schulz, Steffen / Katzenbeisser, Stefan et al. | 2009
- 136
-
Authentic Time-Stamps for Archival StorageOprea, Alina / Bowers, Kevin D. et al. | 2009
- 152
-
Towards a Theory of Accountability and AuditJagadeesan, Radha / Jeffrey, Alan / Pitcher, Corin / Riely, James et al. | 2009
- 168
-
Reliable Evidence: Auditability by TypingGuts, Nataliya / Fournet, Cédric / Zappa Nardelli, Francesco et al. | 2009
- 184
-
PCAL: Language Support for Proof-Carrying Authorization SystemsChaudhuri, Avik / Garg, Deepak et al. | 2009
- 200
-
ReFormat: Automatic Reverse Engineering of Encrypted MessagesWang, Zhi / Jiang, Xuxian / Cui, Weidong / Wang, Xinyuan / Grace, Mike et al. | 2009
- 216
-
Protocol Normalization Using Attribute GrammarsDavidson, Drew / Smith, Randy / Doyle, Nic / Jha, Somesh et al. | 2009
- 232
-
Automatically Generating Models for Botnet DetectionWurzinger, Peter / Bilge, Leyla / Holz, Thorsten / Goebel, Jan / Kruegel, Christopher / Kirda, Engin et al. | 2009
- 250
-
Dynamic Enforcement of Abstract Separation of Duty ConstraintsBasin, David / Burri, Samuel J. / Karjoth, Günter et al. | 2009
- 268
-
Usable Access Control in Collaborative Environments: Authorization Based on People-TaggingWang, Qihua / Jin, Hongxia / Li, Ninghui et al. | 2009
- 285
-
Requirements and Protocols for Inference-Proof Interactions in Information SystemsBiskup, Joachim / Gogolin, Christian / Seiler, Jens / Weibert, Torben et al. | 2009
- 303
-
A Privacy Preservation Model for Facebook-Style Social Network SystemsFong, Philip W. L. / Anwar, Mohd / Zhao, Zhen et al. | 2009
- 321
-
New Privacy Results on Synchronized RFID Authentication Protocols against Tag TracingNg, Ching Yu / Susilo, Willy / Mu, Yi / Safavi-Naini, Rei et al. | 2009
- 337
-
Secure Pseudonymous ChannelsMödersheim, Sebastian / Viganò, Luca et al. | 2009
- 355
-
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud ComputingWang, Qian / Wang, Cong / Li, Jin / Ren, Kui / Lou, Wenjing et al. | 2009
- 371
-
Content Delivery Networks: Protection or Threat?Triukose, Sipat / Al-Qudah, Zakaria / Rabinovich, Michael et al. | 2009
- 390
-
Model-Checking DoS Amplification for VoIP Session InitiationShankesi, Ravinder / AlTurki, Musab / Sasse, Ralf / Gunter, Carl A. / Meseguer, José et al. | 2009
- 406
-
The Wisdom of Crowds: Attacks and Optimal ConstructionsDanezis, George / Diaz, Claudia / Käsper, Emilia / Troncoso, Carmela et al. | 2009
- 424
-
Secure Evaluation of Private Linear Branching Programs with Medical ApplicationsBarni, Mauro / Failla, Pierluigi / Kolesnikov, Vladimir / Lazzeretti, Riccardo / Sadeghi, Ahmad-Reza / Schneider, Thomas et al. | 2009
- 440
-
Keep a Few: Outsourcing Data While Maintaining ConfidentialityCiriani, Valentina / Capitani di Vimercati, Sabrina / Foresti, Sara / Jajodia, Sushil / Paraboschi, Stefano / Samarati, Pierangela et al. | 2009
- 456
-
Data Structures with Unpredictable TimingBethea, Darrell / Reiter, Michael K. et al. | 2009
- 472
-
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory ComplianceLi, Tiancheng / Ma, Xiaonan / Li, Ninghui et al. | 2009
- 489
-
Corruption-Localizing HashingCrescenzo, Giovanni / Jiang, Shaoquan / Safavi-Naini, Reihaneh et al. | 2009
- 505
-
Isolating JavaScript with Filters, Rewriting, and WrappersMaffeis, Sergio / Mitchell, John C. / Taly, Ankur et al. | 2009
- 523
-
An Effective Method for Combating Malicious Scripts ClickbotsPeng, Yanlin / Zhang, Linfeng / Chang, J. Morris / Guan, Yong et al. | 2009
- 539
-
Client-Side Detection of XSS Worms by Monitoring Payload PropagationSun, Fangqi / Xu, Liang / Su, Zhendong et al. | 2009
- 555
-
Formal Indistinguishability Extended to the Random Oracle ModelEne, Cristian / Lakhnech, Yassine / Ngo, Van Chan et al. | 2009
- 571
-
Computationally Sound Analysis of a Probabilistic Contract Signing ProtocolAizatulin, Mihhail / Schnoor, Henning / Wilke, Thomas et al. | 2009
- 587
-
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based EncryptionBobba, Rakesh / Khurana, Himanshu / Prabhakaran, Manoj et al. | 2009
- 605
-
A Generic Security API for Symmetric Key Management on Cryptographic DevicesCortier, Véronique / Steel, Graham et al. | 2009
- 621
-
ID-Based Secure Distance Bounding and LocalizationTippenhauer, Nils Ole / Čapkun, Srdjan et al. | 2009
- 637
-
Secure Ownership and Ownership Transfer in RFID SystemsDeursen, Ton / Mauw, Sjouke / Radomirović, Saša / Vullers, Pim et al. | 2009
- 655
-
Cumulative Attestation Kernels for Embedded SystemsLeMay, Michael / Gunter, Carl A. et al. | 2009
- 671
-
Super-Efficient Aggregating History-Independent Persistent Authenticated DictionariesCrosby, Scott A. / Wallach, Dan S. et al. | 2009
- 689
-
Set Covering Problems in Role-Based Access ControlChen, Liang / Crampton, Jason et al. | 2009