diff options
Diffstat (limited to 'report/bib/combox.bib')
-rw-r--r-- | report/bib/combox.bib | 133 |
1 files changed, 133 insertions, 0 deletions
diff --git a/report/bib/combox.bib b/report/bib/combox.bib index 57cbdb3..e3744e6 100644 --- a/report/bib/combox.bib +++ b/report/bib/combox.bib @@ -1,3 +1,136 @@ +%3 +@article{yeo, +title = "Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices ", +journal = "Journal of Network and Computer Applications ", +volume = "43", +number = "", +pages = "142 - 156", +year = "2014", +issn = "1084-8045", +doi = "http://dx.doi.org/10.1016/j.jnca.2014.04.006", +url = "http://www.sciencedirect.com/science/article/pii/S1084804514000897", +author = "Hui-Shyong Yeo and Xiao-Shen Phang and Hoon-Jae Lee and Hyotaek Lim", +keywords = "Multiple cloud storage", +keywords = "Mobile devices", +keywords = "Erasure coding", +keywords = "Fault-tolerance", +keywords = "Storage techniques " +} + +@article{yang, +title = "User continuance intention to use cloud storage service ", +journal = "Computers in Human Behavior ", +volume = "52", +pages = "219 - 232", +year = "2015", +issn = "0747-5632", +doi = "http://dx.doi.org/10.1016/j.chb.2015.05.057", +url = "http://www.sciencedirect.com/science/article/pii/S074756321500446X", +author = "Heng-Li Yang and Shiang-Lin Lin", +keywords = "Cloud storage service", +keywords = "Task-technology Fit", +keywords = "Technology acceptance model", +keywords = "Privacy risk " +} + +@article{skycds, +title = "SkyCDS: A resilient content delivery service based on diversified cloud storage ", +journal = "Simulation Modelling Practice and Theory ", +volume = "54", +number = "", +pages = "64 - 85", +year = "2015", +issn = "1569-190X", +doi = "http://dx.doi.org/10.1016/j.simpat.2015.03.006", +url = "http://www.sciencedirect.com/science/article/pii/S1569190X15000477", +author = "J.L. Gonzalez and Jesus Carretero Perez and Victor J. Sosa-Sosa and Luis M. Sanchez and Borja Bergua", +keywords = "Content delivery", +keywords = "Multi-cloud storage", +keywords = "Pub/Sub overlay", +keywords = "Virtualization", +keywords = "Diversification", +keywords = "Risk management " +} + +@misc{person:joeyh, +title = "Joey Hess", +url = "https://joeyh.name" +} + +@misc{program:git-annex, +title = "git-annex", +url = "https://git-annex.branchable.com", +} + +@misc{documentation:git-annex-hworks, +title = "git-annex - how it works", +url = "https://git-annex.branchable.com/how_it_works/" +} + +@misc{documentation:git-annex-sremotes, +title = "git-annex - special remotes", +url = "https://git-annex.branchable.com/special_remotes/" +} + +@misc{docs:git-annex-as3, +title = "git-annex - special remote - Amazon S3", +url = "https://git-annex.branchable.com/tips/using_Amazon_S3/" +} + +@misc{program:git, +title = "git - the stupid content tracker", +url = "https://git-scm.com/" +} + +@inbook{weatherspoon, +author="Weatherspoon, Hakim and Kubiatowicz, John D.", +editor="Druschel, Peter and Kaashoek, Frans and Rowstron, Antony", +chapter="Erasure Coding Vs. Replication: A Quantitative Comparison", +title="Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers", +year="2002", +publisher="Springer Berlin Heidelberg", +address="Berlin, Heidelberg", +pages="328--337", +isbn="978-3-540-45748-0", +doi="10.1007/3-540-45748-8_31", +url="http://dx.doi.org/10.1007/3-540-45748-8_31" +} + +@misc{protocol:oauth2, +author="D. Hardt", +title="{The OAuth 2.0 Authorization Framework}", +series="Request for Comments", +number="6749", +howpublished="RFC 6749 (Proposed Standard)", +publisher="IETF", +organization="Internet Engineering Task Force", +year=2012, +month=oct, +url="http://www.ietf.org/rfc/rfc6749.txt", +} + +@misc{kaliski, + author="B. Kaliski", + title="{PKCS \#5: Password-Based Cryptography Specification Version 2.0}", + series="Request for Comments", + number="2898", + howpublished="RFC 2898 (Informational)", + publisher="IETF", + organization="Internet Engineering Task Force", + year=2000, + month=sep, + url="http://www.ietf.org/rfc/rfc2898.txt", +} + +@inproceedings{jigdfs, +title="Jigdfs: A secure distributed file system", +author="Bian, Jiang and Seker, Remzi", +booktitle="Computational Intelligence in Cyber Security, 2009. CICS'09. IEEE Symposium on", +pages="76--82", +year=2009, +organization="IEEE" +} + %4 @book{sicp, author = "Harold Abelson and Gerald Jay Sussman and Julie Sussman", |