-
1
-
-
79953223285
-
Perfectly Secure Oblivious RAM without Random Oracles
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly Secure Oblivious RAM without Random Oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144-163. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
2
-
-
80051865953
-
Efficient and private access to outsourced data
-
June
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA (June 2011)
-
(2011)
Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
3
-
-
84886308792
-
Recent advances in access control
-
Gertz, M., Jajodia, S. (eds.) Springer
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Recent advances in access control. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security: Applications and Trends. Springer (2008)
-
(2008)
Handbook of Database Security: Applications and Trends
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
4
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43(3), 473 (1996)
-
(1996)
Journal of the ACM (JACM)
, vol.43
, Issue.3
, pp. 473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
5
-
-
79960005023
-
Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
-
Goodrich, M.T., Mitzenmacher, M.: Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6756
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
6
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proc. Network and Distributed Systems Security (NDSS) Symposium 2003, pp. 131-145 (2003)
-
(2003)
Proc. Network and Distributed Systems Security (NDSS) Symposium 2003
, pp. 131-145
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
8
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: USENIX Conference on File and Storage Technologies (2003)
-
USENIX Conference on File and Storage Technologies (2003)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
9
-
-
44449129423
-
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
10
-
-
84863495459
-
Tight budget? Look to the 'Cloud'
-
Kundra, V.: Tight budget? look to the 'Cloud'. The New York Times (2011), http://www.nytimes.com/2011/08/31/opinion/tight-budget-look-to-the-cloud.html?- r=1
-
(2011)
The New York Times
-
-
Kundra, V.1
-
11
-
-
77957007201
-
Oblivious RAM Revisited
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Pinkas, B., Reinman, T.: Oblivious RAM Revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
12
-
-
85032616916
-
Enabling security in cloud storage slas with cloudproof
-
Popa, R.A., Lorch, J.R., Molnar, D., Wang, H.J., Zhuang, L.: Enabling security in cloud storage slas with cloudproof. In: Proc. USENIX Annual Technical Conference, ATC 2011 (2011)
-
(2011)
Proc. USENIX Annual Technical Conference, ATC 2011
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
13
-
-
79952021726
-
Encryption-based policy enforcement for cloud storage
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. In: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, ICDCSW 2010, pp. 42-51 (2010)
-
(2010)
Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, ICDCSW 2010
, pp. 42-51
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
14
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
ACM, New York
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 139-148. ACM, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
15
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE Press, Piscataway
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 534-542. IEEE Press, Piscataway (2010)
-
(2010)
Proceedings of the 29th Conference on Information Communications, INFOCOM 2010
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|