-
1
-
-
84881230305
-
-
http://www.storagereview.com/php/benchmark/suite-v4.php?typeID= 10&testbedID=4&osID=6&raidconfigID=1&numDrives=1&devID-0= 368&devCnt=1.
-
-
-
-
3
-
-
84881220150
-
-
Sloccount. http://www.dwheeler.com/sloccount/.
-
Sloccount
-
-
-
6
-
-
84881223761
-
-
Personal communication with Radu Sion and Peter Williams., Nov.
-
Personal communication with Radu Sion and Peter Williams., Nov. 2012.
-
(2012)
-
-
-
7
-
-
33746784225
-
Almost optimal private information retrieval
-
D. Asonov and J.-C. Freytag. Almost optimal private information retrieval. In PET, 2003.
-
(2003)
PET
-
-
Asonov, D.1
Freytag, J.-C.2
-
8
-
-
84874786070
-
Obliviad: Provably secure and practical online behavioral advertising
-
M. Backes, A. Kate, M. Maffe, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S & P, 2012.
-
(2012)
S & P
-
-
Backes, M.1
Kate, A.2
Maffe, M.3
Pecina, K.4
-
10
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In CCSW, 2009.
-
(2009)
CCSW
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
11
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
12
-
-
84881225045
-
A secure processor architecture for encrypted computation on untrusted programs
-
C. W. Fletcher, M. v. Dijk, and S. Devadas. A secure processor architecture for encrypted computation on untrusted programs. In STC, 2012.
-
(2012)
STC
-
-
Fletcher, C.W.1
Dijk, M.V.2
Devadas, S.3
-
13
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
14
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
18
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
20
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
DOI 10.1109/MSP.2005.49
-
A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20-28, Mar. 2005. (Pubitemid 40542058)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.W.2
-
22
-
-
72249120603
-
sel4: Formal verification of an os kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: formal verification of an os kernel. In SOSP, 2009.
-
(2009)
SOSP
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
23
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
24
-
-
0002970064
-
On micro-kernel construction
-
J. Liedtke. On micro-kernel construction. In SOSP, 1995.
-
(1995)
SOSP
-
-
Liedtke, J.1
-
25
-
-
84890416103
-
Shroud: Ensuring private access to large-scale data in the data center
-
J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, 2013:199-213, 2013.
-
(2013)
FAST
, vol.2013
, pp. 199-213
-
-
Lorch, J.R.1
Parno, B.2
Mickens, J.W.3
Raykova, M.4
Schiffman, J.5
-
26
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. D. Gligor, and A. Perrig. Trustvisor: Efficient TCB reduction and attestation. In S & P, 2010.
-
(2010)
S & P
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
27
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, 2008.
-
(2008)
EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
29
-
-
0030714231
-
Private information storage
-
extended abstract
-
R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
34
-
-
78650083239
-
Seeding clouds with trust anchors
-
J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel. Seeding clouds with trust anchors. In CCSW, pages 43-46, 2010.
-
(2010)
CCSW
, pp. 43-46
-
-
Schiffman, J.1
Moyer, T.2
Vijayakumar, H.3
Jaeger, T.4
McDaniel, P.5
-
36
-
-
17444403861
-
Outbound authentication for programmable secure coprocessors
-
S. W. Smith. Outbound authentication for programmable secure coprocessors. In ESORICS, 2002.
-
(2002)
ESORICS
-
-
Smith, S.W.1
-
37
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Syst. J., 40(3):683-695, Mar. 2001. (Pubitemid 32933425)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
38
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Comput. Netw., 31(9):831-860, 1999.
-
(1999)
Comput. Netw.
, vol.31
, Issue.9
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
40
-
-
85180805635
-
Towards practical oblivious RAM
-
E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. In NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
41
-
-
84874906821
-
Iris: A scalable cloud file system with efficient integrity checks
-
E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A scalable cloud file system with efficient integrity checks. In ACSAC, 2012.
-
(2012)
ACSAC
-
-
Stefanov, E.1
Van Dijk, M.2
Oprea, A.3
Juels, A.4
-
42
-
-
77954565496
-
Nova: A microhypervisor-based secure virtualization architecture
-
U. Steinberg and B. Kauer. Nova: a microhypervisor-based secure virtualization architecture. In EuroSys, 2010.
-
(2010)
EuroSys
-
-
Steinberg, U.1
Kauer, B.2
-
44
-
-
84881256639
-
Round-optimal access privacy on outsourced storage
-
P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
45
-
-
84869381921
-
Single round access privacy on outsourced storage
-
P. Williams and R. Sion. Single round access privacy on outsourced storage. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
46
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
47
-
-
84869453208
-
Privatefs: A parallel oblivious file system
-
P. Williams, R. Sion, and A. Tomescu. Privatefs: A parallel oblivious file system. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
48
-
-
80755169468
-
Sedic: Privacy-aware data intensive computing on hybrid clouds
-
K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan. Sedic: privacy-aware data intensive computing on hybrid clouds. In CCS, 2011.
-
(2011)
CCS
-
-
Zhang, K.1
Zhou, X.2
Chen, Y.3
Wang, X.4
Ruan, Y.5
|