Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,927,275 papers from all fields of science
Search
Sign In
Create Free Account
Storage security
Storage security is a specialty area of security that is concerned with securing data storage systems and ecosystems and the data that resides on…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
ISO/IEC 27040
Storage Networking Industry Association
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An efficient auditing scheme for data storage security in cloud
Jayashree Agarkhed
,
ASHALATHA RAMEGOWDA
International Conference on Circuit, Power and…
2017
Corpus ID: 21860668
Cloud computing provides tremendous data storage and computing capabilities to its users. Large amount of people can store…
Expand
2015
2015
An Indian Journal
Shuying Li
,
Yang Pan
2015
Corpus ID: 67075691
With the advance of cloud computing technology
2014
2014
The Effects of Secondary Trapping Mechanisms on Geologic Storage of Carbon Dioxide
C. Ruprecht
2014
Corpus ID: 92603546
2014
2014
Effective Verification and Encryption of Data for Users Delegation Privacy
Darshan B P
,
Prof. Shanthala C P
2014
Corpus ID: 61765285
Cloud computing provides storage facility and services in which users can store their data remotely and avail the on demand high…
Expand
2014
2014
Cloud data auditing with designated verifier
Solomon Guadie Worku
,
Chunxiang Xu
,
Jining Zhao
Frontiers of Computer Science
2014
Corpus ID: 255386125
An auditing scheme is a good way to prove owner’s data outsourced to the cloud are kept intact, and a scheme capable of giving…
Expand
2013
2013
CRYPTO AS A SERVICE
Mengzhen Wang
,
Liu Li
International Conference on Cloud Computing
2013
Corpus ID: 56369171
Cloud security is one of the most important issues in practice of cloud computing. In this paper, we proposed a crypto cloud…
Expand
Highly Cited
2012
Highly Cited
2012
Improving public auditability, data possession in data storage security for cloud computing
M. Venkatesh
,
M. Sumalatha
,
Mr. C. SelvaKumar
International Conference on Recent Trends in…
2012
Corpus ID: 18348360
Cloud computing is Internet based technology where the users can subscribe high quality of services from data and software that…
Expand
2011
2011
Web Services Security Architectures for Secure Service Oriented Analysis and Design
D. Shravani
,
Dr. P. Suresh Varma
,
Dr. B. Padmaja Rani
,
K. Rao
,
M. U. Kumar
2011
Corpus ID: 212503426
— This paper discusses the research methodology on Web Services Security Architectures for Secure Service Oriented Analysis and…
Expand
2005
2005
Protecting cryptographic keys and computations via virtual secure coprocessing
J. P. McGregor
,
R. Lee
CARN
2005
Corpus ID: 6680936
Cryptographic processing is a critical component of secure networked computing systems. The protection offered by cryptographic…
Expand
Review
2005
Review
2005
An innovative European integrated project: Castor-CO2 from capture to storage
P. L. Thiez
,
Georges Mosditchian
,
+4 authors
E. Lindeberg
2005
Corpus ID: 107933658
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE