-
1
-
-
84858109051
-
-
Gmail Drive, http://www.viksoe.dk/code/gmail.htm
-
Gmail Drive
-
-
-
2
-
-
37849020757
-
-
http://www.roamdrive.com
-
-
-
-
4
-
-
37849022788
-
-
Gmail program policies, http://mail.google.com/mail/help/intl/en/ program_policies.html
-
Gmail program policies
-
-
-
7
-
-
37849028017
-
-
Goh, E.j, Secure Indexes in submission
-
Goh, E.j.: Secure Indexes (in submission)
-
-
-
-
8
-
-
37849044941
-
-
RSA Laboraties. PKCS #5 V2.1: Password Based Cryptography Standard, ftp ://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2_1.pdf
-
RSA Laboraties. PKCS #5 V2.1: Password Based Cryptography Standard, ftp ://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2_1.pdf
-
-
-
-
9
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
IEEE Computer Society Press, Los Alamitos
-
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: 2000 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
2000 IEEE Symposium on Research in Security and Privacy
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
11
-
-
0035658603
-
Computer crimes: Theorizing about the enemy within
-
Dhillon, G., Moores, S.: Computer crimes: theorizing about the enemy within. Computers & Security 20(8), 715-723
-
Computers & Security
, vol.20
, Issue.8
, pp. 715-723
-
-
Dhillon, G.1
Moores, S.2
-
12
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database-Service-Provider Model
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: 2002 ACM SIGMOD Conference on Management of Data (June 2002)
-
(2002)
2002 ACM SIGMOD Conference on Management of Data (June
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
13
-
-
85086526876
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
ACM Press, New York
-
Damiani, E., Vimercati, S.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM Press, New York
-
Proceedings of the 10th ACM conference on Computer and communications security
-
-
Damiani, E.1
Vimercati, S.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
Goh, E, Shacham, H, Modadugu, N, Boneh, D, eds
-
Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: Goh, E., Shacham, H., Modadugu, N., Boneh, D. (eds.) Proc. Network and Distributed Systems Security (NDSS) Symposium (2003)
-
(2003)
Proc. Network and Distributed Systems Security (NDSS) Symposium
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
15
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proc. 2nd USENIX Conference on File and Storage Technologies (FAST) (2003)
-
(2003)
Proc. 2nd USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
16
-
-
0012579128
-
Cryptfs: A Stackable vnode level encryption file system
-
Technical Report, Columbia University , CUCS-021-98
-
Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A Stackable vnode level encryption file system. Technical Report, Columbia University (1998), CUCS-021-98
-
(1998)
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
-
17
-
-
0003490877
-
-
RFC 3530 April
-
Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: NFS version 4 protocol. RFC 3530 (April 2003)
-
(2003)
NFS version 4 protocol
-
-
Shepler, S.1
Callaghan, B.2
Robinson, D.3
Thurlow, R.4
Beame, C.5
Eisler, M.6
Noveck, D.7
|