메뉴 건너뛰기




Volumn 7796 LNCS, Issue , 2013, Pages 126-146

Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage

Author keywords

Formal Methods; Protocol Verification; Web Security

Indexed keywords

AUTOMATED FORMAL ANALYSIS; CLIENT SIDES; CLOUD STORAGES; CONFERENCE MANAGEMENT SYSTEMS; E-VOTING; FORMAL ANALYSIS; PASSWORD MANAGERS; PROTOCOL VERIFICATION; PROVERIF; USER DATA; WEB APPLICATION; WEB SECURITY; WEB STORAGE;

EID: 84874442652     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36830-1_7     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 3
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. SIGPLAN Not. 36, 104-115 (2001)
    • (2001) SIGPLAN Not. , vol.36 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 4
    • 85026581986 scopus 로고    scopus 로고
    • Helios: Web-based open-audit voting
    • Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335-348 (2008)
    • (2008) USENIX Security Symposium , pp. 335-348
    • Adida, B.1
  • 6
    • 77957587422 scopus 로고    scopus 로고
    • Towards a formal foundation of web security
    • Akhawe, D., Barth, A., Lam, P.E., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: CSF, pp. 290-304 (2010)
    • (2010) CSF , pp. 290-304
    • Akhawe, D.1    Barth, A.2    Lam, P.E.3    Mitchell, J.4    Song, D.5
  • 7
    • 84859355144 scopus 로고    scopus 로고
    • Privacy Supporting Cloud Computing: ConfiChair, a Case Study
    • Degano, P., Guttman, J.D. (eds.) POST 2012. Springer, Heidelberg
    • Arapinis, M., Bursuc, S., Ryan, M.: Privacy Supporting Cloud Computing: ConfiChair, a Case Study. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 89-108. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7215 , pp. 89-108
    • Arapinis, M.1    Bursuc, S.2    Ryan, M.3
  • 8
    • 84866927100 scopus 로고    scopus 로고
    • Discovering concrete attacks on website authorization by formal analysis
    • Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: CSF, pp. 247-262 (2012)
    • (2012) CSF , pp. 247-262
    • Bansal, C.1    Bhargavan, K.2    Maffeis, S.3
  • 9
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: CCS, pp. 75-88 (2008)
    • (2008) CCS , pp. 75-88
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 12
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 15
    • 84869427671 scopus 로고    scopus 로고
    • Featherweight Firefox: Formalizing the core of a web browser
    • Bohannon, A., Pierce, B.C.: Featherweight Firefox: Formalizing the core of a web browser. In: WebApps (2010)
    • (2010) WebApps
    • Bohannon, A.1    Pierce, B.C.2
  • 16
    • 33646034935 scopus 로고    scopus 로고
    • Browser Model for Security Analysis of Browser-Based Protocols
    • De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
    • Groß, T.R., Pfitzmann, B., Sadeghi, A.-R.: Browser Model for Security Analysis of Browser-Based Protocols. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 489-508. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 489-508
    • Groß, T.R.1    Pfitzmann, B.2    Sadeghi, A.-R.3
  • 18
    • 84959059587 scopus 로고    scopus 로고
    • Alloy: A Logical Modelling Language
    • Bert, D., Bowen, J.P., King, S., Waldén, M. (eds.) ZB 2003. Springer, Heidelberg
    • Jackson, D.: Alloy: A Logical Modelling Language. In: Bert, D., Bowen, J.P., King, S., Waldén, M. (eds.) ZB 2003. LNCS, vol. 2651, p. 1. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2651 , pp. 1
    • Jackson, D.1
  • 19
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic Cloud Storage
    • Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. Springer, Heidelberg
    • Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 20
    • 84947906944 scopus 로고    scopus 로고
    • Secure Applications of Low-Entropy Keys
    • Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. Springer, Heidelberg
    • Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure Applications of Low-Entropy Keys. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 121-134. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1396 , pp. 121-134
    • Kelsey, J.1    Schneier, B.2    Hall, C.3    Wagner, D.4
  • 22
    • 80755172908 scopus 로고    scopus 로고
    • Busting frame busting: A study of clickjacking vulnerabilities at popular sites
    • Rydstedt, G., Bursztein, E., Boneh, D., Jackson, C.: Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In: Web 2.0 S&P (2010)
    • (2010) Web 2.0 S&P
    • Rydstedt, G.1    Bursztein, E.2    Boneh, D.3    Jackson, C.4
  • 24
    • 77950302301 scopus 로고    scopus 로고
    • Information-Flow-Based Access Control for Web Browsers
    • Yoshihama, S., Tateishi, T., Tabuchi, N., Matsumoto, T.: Information-Flow-Based Access Control for Web Browsers. IEICE Transactions E92-D(5), 836-850 (2009)
    • (2009) IEICE Transactions , vol.E92-D , Issue.5 , pp. 836-850
    • Yoshihama, S.1    Tateishi, T.2    Tabuchi, N.3    Matsumoto, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.