2014 IEEE 6th International Conference on Cloud Computing Technology and Science 2014
DOI: 10.1109/cloudcom.2014.18
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Proof of Violation for Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In the traditional PKI architecture, the owner of the web certificate cannot obtain effective evidence to supervise the CA. To solve this problem, we employ the idea from proof of violation (POV) for cloud storage systems [41]. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud.…”
Section: Protocols For the Request Phasementioning
confidence: 99%
“…In the traditional PKI architecture, the owner of the web certificate cannot obtain effective evidence to supervise the CA. To solve this problem, we employ the idea from proof of violation (POV) for cloud storage systems [41]. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud.…”
Section: Protocols For the Request Phasementioning
confidence: 99%