Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315317
|View full text |Cite
|
Sign up to set email alerts
|

Pors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
158
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 1,323 publications
(159 citation statements)
references
References 32 publications
0
158
0
1
Order By: Relevance
“…The more popular the site is, the slower it will get when you are using it. If what you want is your own dedicated Web OS (Juels et al, 2007) that you can use to manage your online stuff and also to provide an environment to collaborate with your colleagues/partners, then eye OS is the software for you. Eye OS is free and open source cloud OS software that you can install on your own Web server.…”
Section: Own Cloud Operating System With Eyesmentioning
confidence: 99%
See 2 more Smart Citations
“…The more popular the site is, the slower it will get when you are using it. If what you want is your own dedicated Web OS (Juels et al, 2007) that you can use to manage your online stuff and also to provide an environment to collaborate with your colleagues/partners, then eye OS is the software for you. Eye OS is free and open source cloud OS software that you can install on your own Web server.…”
Section: Own Cloud Operating System With Eyesmentioning
confidence: 99%
“…Their scheme combines spot-checking and error correcting code to ensure both possession and irretrievability of files on archive service (Juels et al, 2007) systems. Built on this model and constructed a random linear function based homomorphic authenticator which enables unlimited number of challenges and requires less communication overhead due to its usage of relatively small size of BLS signature.…”
Section: Nonfunctional Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Clouds is still under the fear of dogmatism for traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks. Recently many works are in continuations that has served a milestone in the way to secure data integrity and storage security in cloud [8], [9], [20][21][22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…[25] suggested the schemes by allowing the TPA to act as a mediator for the system to work with the Service providers (CSP), on behalf of user to communicate and get dynamic data storage and integrity facility of the cloud. Here a brief counting on method on MHT is done to modify the storage of data and to improve the data integrity.…”
Section: Related Workmentioning
confidence: 99%