Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues

M Sookhak, A Gani, H Talebian, A Akhunzada… - ACM Computing …, 2015‏ - dl.acm.org
Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that
provides reliable and resilient infrastructure for users to remotely store data and use on …

[ספר][B] Modern information retrieval

R Baeza-Yates, B Ribeiro-Neto - 1999‏ - people.ischool.berkeley.edu
Information retrieval (IR) has changed considerably in recent years with the expansion of the
World Wide Web and the advent of modern and inexpensive graphical user interfaces and …

Provable data possession at untrusted stores

G Ateniese, R Burns, R Curtmola, J Herring… - Proceedings of the 14th …, 2007‏ - dl.acm.org
We introduce a model for provable data possession (PDP) that allows a client that has
stored data at an untrusted server to verify that the server possesses the original data …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008‏ - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - Proceedings of the 2006 …, 2006‏ - dl.acm.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

[PDF][PDF] Making Byzantine fault tolerant systems tolerate Byzantine faults

A Clement, E Wong, L Alvisi, M Dahlin… - Proceedings of the 6th …, 2009‏ - usenix.org
This paper argues for a new approach to building Byzantine fault tolerant replication
systems. We observe that although recently developed BFT state machine replication …

MR-PDP: Multiple-replica provable data possession

R Curtmola, O Khan, R Burns… - 2008 the 28th …, 2008‏ - ieeexplore.ieee.org
Many storage systems rely on replication to increase the availability and durability of data on
untrusted storage systems. At present, such storage systems provide no strong evidence that …

[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.

R Geambasu, T Kohno, AA Levy, HM Levy - USENIX security symposium, 2009‏ - usenix.org
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …

WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak, A Gani, MK Khan, R Buyya - 2017‏ - Elsevier
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …

[ספר][B] Microwaves and metals

M Gupta, EWW Leong - 2008‏ - books.google.com
Using microwaves to treat metal-based materials is rapidly emerging as an energy-efficient
tool to interact with metals for a number of processes such as sintering, melting, brazing …