搜索结果: 1-6 共查到“军事学 distributed storage”相关记录6条 . 查询时间(0.062 秒)
AS3: Adaptive Social Secret Sharing for Distributed Storage Systems
distributed storage social secret sharing applied cryptography
2017/8/1
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and...
AS3: Adaptive Social Secret Sharing for Distributed Storage Systems
distributed storage social secret sharing applied cryptography
2017/8/1
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
Key Regression:Enabling Efficient Key Distribution for Secure Distributed Storage
Key regression key rotation, lazy revocation key distribution
2009/3/3
The Plutus file system introduced the notion of key rotation as a means to derive a sequence
of temporally-related keys from the most recent key. In this paper we show that, despite natural intuition...
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
Enforcing Confinement Distributed Storage Cryptographic Model Access Control
2009/2/11
This work is concerned with the security of the standard T10 OSD protocol, a capability-
based protocol for object stores designed by the OSD SNIA working group. The Object Store
security protocol i...
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Proxy Re-Encryption Schemes Secure Distributed Storage
2009/1/14
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption,in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without see...