메뉴 건너뛰기




Volumn 33, Issue 3, 2015, Pages

Shielding applications from an untrusted cloud with Haven

Author keywords

Cloud security; D.4.6 operating systems : Security and protection; D.4.7 operating systems : Organization and design; Design; Enclave; Intel SGX; Library OS; Security; Shielded execution; Trusted computing

Indexed keywords

COMPUTER HARDWARE; DESIGN; FIRMWARE; HARDWARE; TRUSTED COMPUTING; WINDOWS OPERATING SYSTEM;

EID: 84941008296     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/2799647     Document Type: Review
Times cited : (338)

References (70)
  • 1
    • 84893554917 scopus 로고    scopus 로고
    • Retrieved July 23, 2015, from
    • Amazon Web Services. 2013. AWS CloudHSM Getting Started Guide. Retrieved July 23, 2015, from http://aws.amazon.com/cloudhsm/.
    • (2013) AWS CloudHSM Getting Started Guide
  • 3
    • 0026812740 scopus 로고
    • Scheduler activations: Effective kernel support for the user-level management of threads
    • Thomas E. Anderson, Brian N. Bershad, Edward D. Lazowska, and Henry M. Levy. 1992. Scheduler activations: Effective kernel support for the user-level management of threads. ACM Transactions on Computer Systems 10, 53-79.
    • (1992) ACM Transactions on Computer Systems , vol.10 , pp. 53-79
    • Anderson, T.E.1    Bershad, B.N.2    Lazowska, E.D.3    Levy, H.M.4
  • 14
    • 84940972980 scopus 로고    scopus 로고
    • Retrieved July 23, 2015, from
    • Cloud Security Alliance. 2013. Government Access to Information Survey. Retrieved July 23, 2015, from https://cloudsecurityalliance.org/research/surveys/#-nsa-prism.
    • (2013) Government Access to Information Survey
  • 19
    • 84888235428 scopus 로고    scopus 로고
    • U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
    • June 6, 2013
    • Barton Gellman and Laura Poitras. 2013. U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post, June 6, 2013.
    • (2013) Washington Post
    • Gellman, B.1    Poitras, L.2
  • 20
    • 84891637210 scopus 로고    scopus 로고
    • NSA infiltrates links to yahoo, google data centers worldwide, snowden documents say
    • October 30, 2013
    • Barton Gellman and Ashkan Soltani. 2013. NSA infiltrates links to yahoo, google data centers worldwide, snowden documents say. Washington Post, October 30, 2013.
    • (2013) Washington Post
    • Gellman, B.1    Soltani, A.2
  • 22
    • 84865518868 scopus 로고    scopus 로고
    • Homomorphic evaluation of the AES circuit
    • Advances in Cryptology - CRYPTO 2012 Springer
    • Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Homomorphic evaluation of the AES circuit. In Advances in Cryptology - CRYPTO 2012. Lecture Notes in Computer Science, Vol. 7417. Springer, 850-867,
    • (2012) Lecture Notes in Computer Science , vol.7417 , pp. 850-867
    • Gentry, C.1    Halevi, S.2    Smart, N.P.3
  • 45
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • Advances in Cryptology - CRYPTO '87 Springer
    • Ralph Merkle. 1987. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO '87. Lecture Notes in Computer Science, Vol. 293. Springer, 369-378.
    • (1987) Lecture Notes in Computer Science , vol.293 , pp. 369-378
    • Merkle, R.1
  • 46
    • 84940984657 scopus 로고    scopus 로고
    • Revelations of N.S.A. spying cost U.S. tech companies
    • March 21, 2014
    • Claire Cain Miller. 2014. Revelations of N.S.A. spying cost U.S. tech companies. New York Times, March 21, 2014.
    • (2014) New York Times
    • Miller, C.C.1
  • 49
    • 84941002116 scopus 로고    scopus 로고
    • Retrieved July 24, 2015, from
    • Dan Plastina. 2015. Azure Key Vault - Making the Cloud Safer. Retrieved July 24, 2015, from http://blogs.technet.com/b/kv/archive/2015/01/08/azure-key-vault-making-the-cloud-safer.aspx.
    • (2015) Azure Key Vault - Making the Cloud Safer
    • Plastina, D.1
  • 51
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • Gerald J. Popek and Robert P. Goldberg. 1974. Formal requirements for virtualizable third generation architectures. Communications of the ACM 17, 7, 412-421. DOI:http://dx.doi.org/10.1145/361011.361073
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 58
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Sean W. Smith and Steve Weingart. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks 31, 9, 831-860. http://dl.acm.org/citation.cfm?id=324119.324128
    • (1999) Computer Networks , vol.31 , Issue.9 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 68
    • 74049138993 scopus 로고    scopus 로고
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Aaram Yun, Chunhui Shi, and Yongdae Kim. 2009. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 67-76.
    • (2009) Proceedings of the 2009 ACM Workshop on Cloud Computing Security , pp. 67-76
    • Yun, A.1    Shi, C.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.