메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Silverline: Toward data confidentiality in storage-intensive cloud applications

Author keywords

Cloud computing; Data confidentiality; Program analysis

Indexed keywords

AMAZON EC2; APPLICATION DATA; COMPLEX PROCESSES; DATA ACCESS; DATA CONFIDENTIALITY; DATA SHARING; DATA SUBSETS; ENCRYPTION KEY; HIGH AVAILABILITY; KEY COMPROMISE; KEY MANAGEMENT; OPERATOR ERROR; PROGRAM ANALYSIS; REAL APPLICATIONS; SENSITIVE APPLICATION; SENSITIVE DATAS; SOFTWARE BUG; USER DEVICES; WEB APPLICATION;

EID: 82155187176     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2038916.2038926     Document Type: Conference Paper
Times cited : (66)

References (53)
  • 1
    • 43449138479 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • ABDALLA, M., ET AL. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology (2008).
    • (2008) Journal of Cryptology
    • Abdalla, M.1
  • 2
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large databases
    • AGRAWAL, R., IMIELI ŃSKI, T., AND SWAMI, A.Mining association rules between sets of items in large databases. Proc. of ACM SIGMOD (1993).
    • (1993) Proc. of ACM SIGMOD
    • Agrawal, R.1    Imieliński, T.2    Swami, A.3
  • 4
    • 82155174890 scopus 로고    scopus 로고
    • AMAZON
    • AMAZON. Nimbus health. http://aws.amazon.com/solutions/case-studies/ nimbus-health/.
  • 5
    • 82155188128 scopus 로고    scopus 로고
    • AMAZON
    • AMAZON. Sharethis. http://aws.amazon.com/solutions/case-studies/ sharethis/.
  • 18
    • 85008249099 scopus 로고    scopus 로고
    • Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
    • CLAUSE, J., AND ORSO, A. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. In Proc. of ISSTA (2009).
    • (2009) Proc. of ISSTA
    • Clause, J.1    Orso, A.2
  • 28
    • 41149097554 scopus 로고    scopus 로고
    • BEEP: Browser-enforced embedded policies
    • JIM, T., SWAMY, N., AND HICKS, M. BEEP: Browser-enforced embedded policies. In Proc. of WWW (2007).
    • (2007) Proc. of WWW
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 30
    • 77649186056 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • KATZ, J., SAHAI, A., AND WATERS, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proc. of EUROCRYPT 2008.
    • (2008) Proc. of EUROCRYPT
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 38
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS) (2005).
    • (2005) Proc. of Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 46
    • 82155188120 scopus 로고    scopus 로고
    • VENEMA, W. Taint support for php. http://wiki.php.net/rfc/taint.
    • Venema, W.1
  • 50
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • XU, W., BHATKAR, E., AND SEKAR, R. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. of USENIX Security Symposium (2006).
    • (2006) Proc. of USENIX Security Symposium
    • Xu, W.1    Bhatkar, E.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.