메뉴 건너뛰기




Volumn , Issue , 2010, Pages 304-311

Blind processing: Securing data against system administrators

Author keywords

[No Author keywords available]

Indexed keywords

DEMAND SIDE MANAGEMENTS; DISTRIBUTION SYSTEMS; GAINING ACCESS; HARDWARE AND SOFTWARE; INFORMATION EXCHANGES; INFORMATION SHARING; POWER GRIDS; PROTECTION MECHANISMS; SECURE COMMUNICATIONS; SECURITY MECHANISM; SECURITY TECHNOLOGY; SENSITIVE DATAS; SYSTEM ADMINISTRATORS; SYSTEM COMPONENTS; TRUSTED COMPUTING; WHOLE SYSTEMS;

EID: 77957888726     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMSW.2010.5486559     Document Type: Conference Paper
Times cited : (7)

References (78)
  • 2
    • 77957891863 scopus 로고    scopus 로고
    • Trusted computing group. http://www.trustedcomputinggroup.org.
  • 6
    • 0037002089 scopus 로고    scopus 로고
    • Security challenges for the electricity infrastructure (supplement to computer magazine)
    • M. Amin. Security challenges for the electricity infrastructure (supplement to computer magazine). Computer, 35(4):8-10, 2002.
    • (2002) Computer , vol.35 , Issue.4 , pp. 8-10
    • Amin, M.1
  • 10
    • 0032593003 scopus 로고    scopus 로고
    • A fast distributed implementation of optimal power flow
    • August
    • R. Baldick, B. H. Kim, C. Chase, and Y. Luo. A fast distributed implementation of optimal power flow. IEEE Trans. On Power Sys., 14(3):858, August 1999.
    • (1999) IEEE Trans. on Power Sys. , vol.14 , Issue.3 , pp. 858
    • Baldick, R.1    Kim, B.H.2    Chase, C.3    Luo, Y.4
  • 12
    • 70349230089 scopus 로고    scopus 로고
    • E-EMV: Emulating EMV for internet payments with trusted computing technologies
    • ACM
    • S. Balfe and K. G. Paterson. e-EMV: emulating EMV for Internet payments with trusted computing technologies. In 3rd ACM workshop on Scalable trusted computing, pages 81-92. ACM, 2008.
    • (2008) 3rd ACM Workshop on Scalable Trusted Computing , pp. 81-92
    • Balfe, S.1    Paterson, K.G.2
  • 14
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • 04
    • K. J. Biba. Integrity considerations for secure computer systems. Technical report, MITRE Corp., 04 1977.
    • (1977) Technical Report, MITRE Corp.
    • Biba, K.J.1
  • 15
    • 11244353165 scopus 로고    scopus 로고
    • Decentralised security constrained dc-opf of interconnected power systems
    • November
    • P. N. Biskas and A. G. Bakirtzis. Decentralised security constrained dc-opf of interconnected power systems. IEE Proc. Gener. Transm. Distrib., 151(6):747, November 2004.
    • (2004) IEE Proc. Gener. Transm. Distrib. , vol.151 , Issue.6 , pp. 747
    • Biskas, P.N.1    Bakirtzis, A.G.2
  • 18
    • 36348993230 scopus 로고    scopus 로고
    • Contingency filtering techniques for preventive security-constrained optimal power flow
    • November
    • F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel. Contingency filtering techniques for preventive security-constrained optimal power flow. IEEE Trans. On Power Sys., 22(4):1690, November 2007.
    • (2007) IEEE Trans. on Power Sys. , vol.22 , Issue.4 , pp. 1690
    • Capitanescu, F.1    Glavic, M.2    Ernst, D.3    Wehenkel, L.4
  • 20
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology, pages 199-203, 1983.
    • (1983) Advances in Cryptology , pp. 199-203
    • Chaum, D.1
  • 22
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE Computer Society Press
    • D. D. Clark and D. R. Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, 1987.
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 23
    • 33749613601 scopus 로고    scopus 로고
    • Technical analysis of the august 14, 2003, blackout: What happened, why and what did we learn?
    • N. A. E. R. Council Princeton, NJ, July
    • N. A. E. R. Council. Technical analysis of the august 14, 2003, blackout: what happened, why and what did we learn? Technical report, NERC, Princeton, NJ, July 2004.
    • (2004) Technical Report, NERC
  • 26
    • 44049086023 scopus 로고    scopus 로고
    • AES-CBC + elephant diffuser: A disk encryption algorithm for windows vista
    • Aug
    • N. Ferguson. AES-CBC + elephant diffuser: A disk encryption algorithm for windows vista. Technical report, Microsoft, Aug 2006.
    • (2006) Technical Report, Microsoft
    • Ferguson, N.1
  • 27
    • 0033690785 scopus 로고    scopus 로고
    • Lomac: Low water-mark integrity protection for cots environments
    • IEEE Computer Society
    • T. Fraser. Lomac: Low water-mark integrity protection for cots environments. In IEEE Symposium on Security and Privacy, pages 230-245. IEEE Computer Society, 2000.
    • (2000) IEEE Symposium on Security and Privacy , pp. 230-245
    • Fraser, T.1
  • 28
    • 68149092220 scopus 로고    scopus 로고
    • Trusted computing: Security and applications
    • (to appear)
    • E. Gallery and C. J. Mitchell. Trusted computing: Security and applications. Cryptologia. (to appear).
    • Cryptologia
    • Gallery, E.1    Mitchell, C.J.2
  • 31
    • 28244453699 scopus 로고    scopus 로고
    • The conditions for obtaining feasible solutions to security-constrained unit commitment problems
    • November
    • X. Guan, S. Guo, and Q. Zhai. The conditions for obtaining feasible solutions to security-constrained unit commitment problems. IEEE Trans. On Power Sys., 20(4):1746, November 2005.
    • (2005) IEEE Trans. on Power Sys. , vol.20 , Issue.4 , pp. 1746
    • Guan, X.1    Guo, S.2    Zhai, Q.3
  • 32
    • 77952256837 scopus 로고    scopus 로고
    • Towards trustworthy computing systems: Taking microkernels to the next level
    • G. Heiser, K. Elphinstone, I. Kuz, G. Klein, and S. M. Petters. Towards trustworthy computing systems: taking microkernels to the next level. SIGOPS Oper. Syst. Rev., 41(4):3-11, 2007.
    • (2007) SIGOPS Oper. Syst. Rev. , vol.41 , Issue.4 , pp. 3-11
    • Heiser, G.1    Elphinstone, K.2    Kuz, I.3    Klein, G.4    Petters, S.M.5
  • 38
    • 84955566566 scopus 로고    scopus 로고
    • A privacy-enhanced peer-to-peer reputation system
    • Springer-Verlag
    • M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation system. In E-Commerce and Web Technologies, pages 206-215. Springer-Verlag, 2003.
    • (2003) E-Commerce and Web Technologies , pp. 206-215
    • Kinateder, M.1    Pearson, S.2
  • 41
  • 44
    • 33847789626 scopus 로고    scopus 로고
    • Camkes: A component model for secure microkernel-based embedded systems
    • I. Kuz, Y. Liu, I. Gorton, and G. Heiser. Camkes: A component model for secure microkernel-based embedded systems. J. Syst. Softw., 80(5):687-699, 2007.
    • (2007) J. Syst. Softw. , vol.80 , Issue.5 , pp. 687-699
    • Kuz, I.1    Liu, Y.2    Gorton, I.3    Heiser, G.4
  • 52
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • J. M. Mccune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy, pages 110-124, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 110-124
    • Mccune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 54
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • IEEE Computer Society
    • M. C. Mont, S. Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In 14th International Workshop on Database and Expert Systems Applications, page 377. IEEE Computer Society, 2003.
    • (2003) 14th International Workshop on Database and Expert Systems Applications , pp. 377
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 55
    • 77957921279 scopus 로고    scopus 로고
    • New York Independent System Operator. Blackout august 14 February
    • New York Independent System Operator. Blackout august 14,2003 final report. NYISO, February 2005.
    • (2005) 2003 Final Report. NYISO
  • 67
    • 27544477855 scopus 로고    scopus 로고
    • Bind: A fine-grained attestation service for secure distributed systems
    • E. Shi and A. Perrig. Bind: A fine-grained attestation service for secure distributed systems. In IEEE Symposium on Security and Privacy, pages 154-168, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2
  • 68
    • 33646075344 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • October
    • S. W. Smith. Outbound authentication for programmable secure coprocessors. International Journal of Information Security, 3(1):28-41, October 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 28-41
    • Smith, S.W.1
  • 71
    • 24144433949 scopus 로고    scopus 로고
    • Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
    • Kluwer Academic
    • A. Spalka, A. B. Cremers, and H. Langweg. Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs. In IFIP SEC, pages 403-420. Kluwer Academic, 2001.
    • (2001) IFIP SEC , pp. 403-420
    • Spalka, A.1    Cremers, A.B.2    Langweg, H.3
  • 73
    • 37149044968 scopus 로고    scopus 로고
    • Aegis: A single-chip secure processor
    • G. E. Suh, C. W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. IEEE Design & Test, 24(6):570-580, 2007.
    • (2007) IEEE Design & Test , vol.24 , Issue.6 , pp. 570-580
    • Suh, G.E.1    O'Donnell, C.W.2    Devadas, S.3
  • 75
    • 24644461219 scopus 로고    scopus 로고
    • Short linkable ring signatures for e-voting, e-cash and attestation
    • Springer
    • P. P. Tsang and V. K. Wei. Short linkable ring signatures for e-voting, e-cash and attestation. In Information Security Practice and Experience, pages 48-60. Springer, 2005.
    • (2005) Information Security Practice and Experience , pp. 48-60
    • Tsang, P.P.1    Wei, V.K.2
  • 78
    • 50049107144 scopus 로고    scopus 로고
    • Outsourcing security analysis with anonymized logs
    • September
    • J. Zhang, N. Borisov, and W. Yurcik. Outsourcing security analysis with anonymized logs. In Securecomm and Workshops, 2006, pages 1-9, September 2006.
    • (2006) Securecomm and Workshops, 2006 , pp. 1-9
    • Zhang, J.1    Borisov, N.2    Yurcik, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.