共 11 条
- [1] Adya A., Bolosky W.J., Castro M., Cermak G., Cermak G., Et al., Farsite: Federated, available and reliable storage for an incompletely trusted environment, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 36, pp. 1-14, (2002)
- [2] Bhagwan R., Tati K., Cheng Y.C., Savage S., Voelker G.M., Total recall: System support for automated availability management, Proceedings of the 1 St International Conference on Symposium on Networked Systems Design and Implementation, 1, pp. 25-25, (2004)
- [3] Daemen J., Rijmen V., The Design of Rijndael: AES-The Advanced Encryption Standard, (2002)
- [4] Dean J., Ghemawat S., MapReduce: Simplified data processing on large clusters, Commun. ACM, 51, pp. 107-113, (2008)
- [5] Ghemawat S., Gobioff H., Leung S., The google file system, ACM SIGOPS Operat. Syst. Rev., 37, pp. 29-43, (2003)
- [6] Hubbard D., Sutton M., Top Threats to Cloud Computing VI.0, (2010)
- [7] Kahate A., Cryptography and Network Security, (2005)
- [8] Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the 2nd Conference on File and Storage Technologies, pp. 29-42, (2003)
- [9] Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the National Spatial Data Infrastructure, 3, pp. 29-42, (2004)
- [10] Schneier B., Applied Cryptography: Protocols, Algorithm and Source Code in C, (2007)