메뉴 건너뛰기




Volumn , Issue , 2012, Pages 40-44

Scheduling with privacy constraints

Author keywords

information leakage; Scheduling policy; timing side channels

Indexed keywords

ARRIVAL PATTERNS; COMPETING PROCESS; COMPUTING INFRASTRUCTURES; COMPUTING RESOURCE; INFORMATION LEAKAGE; MULTIPLE USER; NETWORK ROUTERS; PRIVACY CONSTRAINTS; SCHEDULING POLICIES; SCHEDULING SYSTEMS; SIDE-CHANNEL; USER SCHEDULING;

EID: 84873142358     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2012.6404704     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 2
    • 79959957319 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • K. Zhang and X.F. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
    • (2009) USENIX Security
    • Zhang, K.1    Wang, X.F.2
  • 7
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • September
    • J. Giles and B. Hajek, "An Information-Theoretic and Game-Theoretic Study of Timing Channels," IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, September 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Springer
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in CryptologyCRYPTO96. Springer, 1996, pp. 104-113.
    • (1996) Advances in CryptologyCRYPTO96 , pp. 104-113
    • Kocher, P.1
  • 11
    • 33747336635 scopus 로고
    • The channel capacity of a certain noisy timing channel
    • July
    • I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, no. 4, pp. 1339-1344, July 1992.
    • (1992) IEEE Trans. Inform. Theory , vol.38 , Issue.4 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 12
    • 84858309174 scopus 로고    scopus 로고
    • Designing router scheduling policies: A privacy perspective
    • IEEE Transactions on april
    • S. Kadloor, Xun Gong, N. Kiyavash, and P. Venkitasubramaniam, "Designing router scheduling policies: A privacy perspective," Signal Processing, IEEE Transactions on, vol. 60, no. 4, pp. 2001-2012, april 2012.
    • (2012) Signal Processing , vol.60 , Issue.4 , pp. 2001-2012
    • Kadloor, S.1    Gong, X.2    Kiyavash, N.3    Venkitasubramaniam, P.4
  • 13
    • 84861617955 scopus 로고    scopus 로고
    • Mitigating timing based information leakage in shared schedulers
    • 2012 Proceedings IEEE, march
    • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Mitigating timing based information leakage in shared schedulers," in INFOCOM, 2012 Proceedings IEEE, march 2012, pp. 1044-1052.
    • (2012) INFOCOM , pp. 1044-1052
    • Kadloor, S.1    Kiyavash, N.2    Venkitasubramaniam, P.3
  • 16
    • 84873183809 scopus 로고    scopus 로고
    • Existence of a delay-privacy trade-off in the design of scheduling policies
    • preparation for a
    • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Existence of a delay-privacy trade-off in the design of scheduling policies," in in preparation for a journal submission. Available online at www.ifp.illinois.edu/ ~kadloor1/kadloor-itw-extended.pdf.
    • Journal Submission
    • Kadloor, S.1    Kiyavash, N.2    Venkitasubramaniam, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.