메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Automated Synthesis of Privacy-Preserving Distributed Applications

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION; HIGH LEVEL LANGUAGES; PRIVACY-PRESERVING TECHNIQUES; PROGRAM COMPILERS;

EID: 85020254094     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (55)
  • 1
    • 80052831413 scopus 로고    scopus 로고
    • Iran, Facebook, and the Limits of Online Activism
    • C. Abadi. Iran, Facebook, and the Limits of Online Activism. Foreign Policy, 2010. http://www.foreignpolicy.com/articles/2010/02/12/irans-failed-facebook-revolution.
    • (2010) Foreign Policy
    • Abadi, C.1
  • 2
    • 33750387038 scopus 로고    scopus 로고
    • Access Control in a Core Calculus of Dependency
    • M. Abadi. Access Control in a Core Calculus of Dependency. SIGPLAN Notices, 41:263-273, 2006.
    • (2006) SIGPLAN Notices , vol.41 , pp. 263-273
    • Abadi, M.1
  • 15
    • 78650000256 scopus 로고    scopus 로고
    • Computationally Sound Verification of Source Code
    • ACM
    • M. Backes, M. Maffei, and D. Unruh. Computationally Sound Verification of Source Code. In CCS '10, pages 387-398. ACM, 2010.
    • (2010) CCS '10 , pp. 387-398
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 16
    • 51749088371 scopus 로고    scopus 로고
    • Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
    • IEEE
    • M. Backes and D. Unruh. Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In CSF'08, pages 255-269. IEEE, 2008.
    • (2008) CSF'08 , pp. 255-269
    • Backes, M.1    Unruh, D.2
  • 22
    • 77950909049 scopus 로고    scopus 로고
    • Modular Verification of Security Protocol Code by Typing
    • K. Bhargavan, C. Fournet, and A. Gordon. Modular Verification of Security Protocol Code by Typing. ACM SIGPLAN Notices, 45(1):445-456, 2010.
    • (2010) ACM SIGPLAN Notices , vol.45 , Issue.1 , pp. 445-456
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3
  • 26
    • 14844295011 scopus 로고    scopus 로고
    • Direct Anonymous Attestation
    • ACM Press
    • E. Brickell, J. Camenisch, and L. Chen. Direct Anonymous Attestation. In CCS'04, pages 132-145. ACM Press, 2004.
    • (2004) CCS'04 , pp. 132-145
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 28
    • 85180796294 scopus 로고    scopus 로고
    • England Riots: Pair Jailed for Four Years for Using Facebook to Incite Disorder
    • H. Carter. England Riots: Pair Jailed for Four Years for Using Facebook to Incite Disorder. Guardian, 2011. http://www.guardian.co.uk/uk/2011/aug/16/uk-riots-four-years-disorder-facebook.
    • (2011) Guardian
    • Carter, H.1
  • 31
    • 84936943868 scopus 로고    scopus 로고
    • A. De Caro. jPBC Library. http://libeccio.dia. unisa.it/projects/jpbc/download.html.
    • jPBC Library
    • De Caro, A.1
  • 32
  • 34
    • 77955354815 scopus 로고    scopus 로고
    • Iranian Crackdown Goes Global
    • F. Fassihi. Iranian Crackdown Goes Global. The Wall Street Journal, 2009. http://online.wsj.com/article/SB125978649644673331.html.
    • (2009) The Wall Street Journal
    • Fassihi, F.1
  • 35
    • 85180786290 scopus 로고    scopus 로고
    • L'Espresso
    • G. Florian. La Polizia ci Spia su Facebook. L'Espresso, 2010. http://espresso. repubblica.it/dettaglio/la-polizia-ci-spia-su-facebook/2137277.
    • (2010) La Polizia ci Spia su Facebook
    • Florian, G.1
  • 37
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-Based Access Control with Hidden Policies and Hidden Credentials
    • K. Frikken, M. Atallah, and J. Li. Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Transactions on Computers, 55(10):1259-1270, 2006.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 39
    • 84976832950 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zeroknowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zeroknowledge proof systems. JACM, 38(3):690-728, 1991.
    • (1991) JACM , vol.38 , Issue.3 , pp. 690-728
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 41
    • 85180813695 scopus 로고    scopus 로고
    • DKAL: Distributed-Knowledge Authorization Language
    • Y. Gurevich and I. Neeman. DKAL: Distributed-Knowledge Authorization Language. In CSF'08. IEEE, 2008.
    • (2008) CSF'08. IEEE
    • Gurevich, Y.1    Neeman, I.2
  • 50
    • 85180622008 scopus 로고    scopus 로고
    • Foreign Policy: Iran's Terrifying Facebook Police
    • E. Morozov. Foreign Policy: Iran's Terrifying Facebook Police. National Public Radio, 2009. http://www.npr.org/templates/story/story.php?storyId=106535773.
    • (2009) National Public Radio
    • Morozov, E.1
  • 51
    • 78650837743 scopus 로고    scopus 로고
    • Cloud computing privacy concerns on our doorstep
    • M. D. Ryan. Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54:36-38, 2011.
    • (2011) Communications of the ACM , vol.54 , pp. 36-38
    • Ryan, M. D.1
  • 53
    • 85180750979 scopus 로고    scopus 로고
    • The National Institute of Standards and Technology. NIST SP, 800-57
    • The National Institute of Standards and Technology. Recommendataion for Key Management - Part 1: General (Revised). NIST SP, 800-57, 2011. http://csrc.nist.gov/groups/ST/toolkit/key-management.html.
    • (2011) Recommendataion for Key Management - Part 1: General (Revised)
  • 55
    • 75649126342 scopus 로고    scopus 로고
    • Cairo Activists Use Facebook to Rattle Regime
    • D. Wolman. Cairo Activists Use Facebook to Rattle Regime. WIRED Magazine, 2008. http://www.wired.com/techbiz/startups/magazine/16-11/ff-facebookegypt.
    • (2008) WIRED Magazine
    • Wolman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.