-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
ABDALLA, M., ET AL. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology (2008).
-
(2008)
Journal of Cryptology
-
-
Abdalla, M.1
-
2
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
AGRAWAL, R., IMIELI ŃSKI, T., AND SWAMI, A.Mining association rules between sets of items in large databases. Proc. of ACM SIGMOD (1993).
-
(1993)
Proc. of ACM SIGMOD
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
4
-
-
82155174890
-
-
AMAZON
-
AMAZON. Nimbus health. http://aws.amazon.com/solutions/case-studies/ nimbus-health/.
-
-
-
-
5
-
-
82155188128
-
-
AMAZON
-
AMAZON. Sharethis. http://aws.amazon.com/solutions/case-studies/ sharethis/.
-
-
-
-
9
-
-
77958454798
-
Persona: An online social network with user defined privacy
-
BADEN, R., BENDER, A., SPRING, N., BHATTACHARJEE, B., AND STARIN, D. Persona: An online social network with user defined privacy. In Proc. of SIGCOMM (2009).
-
(2009)
Proc. of SIGCOMM
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
11
-
-
17444370055
-
Public key encryption with keyword search
-
BONEH, D., DI CRESCENZO, G., OSTROVSKY, R., AND PERSIANO, G. Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004 (2004).
-
(2004)
Advances in Cryptology-Eurocrypt 2004
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
13
-
-
72749089553
-
Trusting the cloud
-
CACHIN, C., KEIDAR, I., AND SHRAER, A. Trusting the Cloud. ACM SIGACT News 40, 2 (2009).
-
(2009)
ACM SIGACT News
, vol.40
, Issue.2
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
16
-
-
41149124878
-
Secure web applications via automatic partitioning
-
Oct.
-
CHONG, S., LIU, J., MYERS, A. C., QI, X., VIKRAM, K., ZHENG, L., AND ZHENG, X. Secure web applications via automatic partitioning. In Proc. of ACM Symposium on Operating Systems Principles (SOSP) (Oct. 2007).
-
(2007)
Proc. of ACM Symposium on Operating Systems Principles (SOSP)
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
18
-
-
85008249099
-
Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
-
CLAUSE, J., AND ORSO, A. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. In Proc. of ISSTA (2009).
-
(2009)
Proc. of ISSTA
-
-
Clause, J.1
Orso, A.2
-
19
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
DAMIANI, E., VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of ACM Conference on Computer and Communications Security (CCS) (2003).
-
(2003)
Proc. of ACM Conference on Computer and Communications Security (CCS)
-
-
Damiani, E.1
Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
22
-
-
74049121230
-
Dynamic provable data possession
-
ERWAY, C., KUPCU, A., PAPAMANTHOU, C., AND TAMASSIA, R. Dynamic provable data possession. In Proc. of ACM Conference on Computer and Communications Security (CCS) (2009).
-
(2009)
Proc. of ACM Conference on Computer and Communications Security (CCS)
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
28
-
-
41149097554
-
BEEP: Browser-enforced embedded policies
-
JIM, T., SWAMY, N., AND HICKS, M. BEEP: Browser-enforced embedded policies. In Proc. of WWW (2007).
-
(2007)
Proc. of WWW
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
30
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
KATZ, J., SAHAI, A., AND WATERS, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proc. of EUROCRYPT 2008.
-
(2008)
Proc. of EUROCRYPT
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
31
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
LI, J., KROHN, M., MAZIÈRES, D., AND SHASHA, D. Secure untrusted data repository (SUNDR). In Proc. Of Operating Systems Design and Implementation (OSDI) (2004).
-
(2004)
Proc. of Operating Systems Design and Implementation (OSDI)
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
37
-
-
0005260169
-
-
Located at
-
MYERS, A., ZHENG, L., ZDANCEWIC, S., CHONG, S., AND NYSTROM, N. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif 2005 (2001).
-
(2001)
Software Release
-
-
Myers, A.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
38
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS) (2005).
-
(2005)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
40
-
-
74049152260
-
Hey, you, get off ofmy cloud: Exploring information leakage in third-party compute clouds
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, You, Get Off ofMy Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proc. of ACM Conference on Computer and Communications Security (CCS) (2009).
-
(2009)
Proc. of ACM Conference on Computer and Communications Security (CCS)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
46
-
-
82155188120
-
-
VENEMA, W. Taint support for php. http://wiki.php.net/rfc/taint.
-
-
-
Venema, W.1
-
49
-
-
85180792232
-
Automatic network protocol analysis
-
WONDRACEK, G., COMPARETTI, P. M., KRUEGEL, C., AND KIRDA, E. Automatic network protocol analysis. In Proc. of Network and Distributed System Security Symposium (NDSS) (2008).
-
(2008)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Wondracek, G.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
-
50
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
XU, W., BHATKAR, E., AND SEKAR, R. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. of USENIX Security Symposium (2006).
-
(2006)
Proc. of USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, E.2
Sekar, R.3
-
51
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proc. of ACM Conference on Computer and Communications Security (CCS) (2007).
-
(2007)
Proc. of ACM Conference on Computer and Communications Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
52
-
-
70349152918
-
Privacy-preserving browser-side scripting with BFlow
-
YIP, A., NARULA, N., KROHN, M., AND MORRIS, R. Privacy-preserving browser-side scripting with BFlow. In Proc. of EuroSys (2009).
-
(2009)
Proc. of EuroSys
-
-
Yip, A.1
Narula, N.2
Krohn, M.3
Morris, R.4
-
53
-
-
84888352157
-
Making information flow explicit inHiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIERES, D.Making information flow explicit inHiStar. In Proc. of Operating Systems Design and Implementation (OSDI) (2006).
-
(2006)
Proc. of Operating Systems Design and Implementation (OSDI)
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazieres, D.4
|