메뉴 건너뛰기




Volumn , Issue , 2014, Pages 33-48

Mimesis Aegis: A mimicry privacy shield a system's approach to data privacy on public cloud

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); CRYPTOGRAPHY; DISTRIBUTED DATABASE SYSTEMS; METADATA; NETWORK LAYERS; REVERSE ENGINEERING; SOCIAL NETWORKING (ONLINE); WEB SERVICES;

EID: 85051025186     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (63)

References (68)
  • 1
    • 84883568208 scopus 로고    scopus 로고
    • Accessibility. http://developer.android.com/guide/topics/ui/accessibility/index.html.
    • Accessibility
  • 3
    • 85076308221 scopus 로고    scopus 로고
    • Cryptocat. https://crypto.cat.
  • 6
    • 85076306960 scopus 로고    scopus 로고
    • Google Accessibility. https://www.google.com/accessibility/policy/.
  • 9
    • 85076296566 scopus 로고    scopus 로고
    • Microsoft Accessibility. http://www.microsoft.com/enable/microsoft/section508.aspx.
  • 20
    • 84883568208 scopus 로고    scopus 로고
    • February
    • Accessibility. https://www.apple.com/accessibility/resources/, February 2014.
    • (2014) Accessibility
  • 21
    • 14644430733 scopus 로고    scopus 로고
    • Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA patriot act) act of 2001
    • 107TH CONGRESS
    • 107TH CONGRESS. Uniting and strengthening america by providing appropriate tools required to intercept and obstruct terrorism (usa patriot act) act of 2001. Public Law 107-56 (2001).
    • (2001) Public Law , pp. 107-156
  • 22
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the facebook
    • Springer
    • ACQUISTI, A., and GROSS, R. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy enhancing technologies (2006), Springer, pp. 36-58.
    • (2006) Privacy Enhancing Technologies , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 25
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • A. Menezes, Ed., Vol. 4622 of Lecture Notes in Computer Science, Springer
    • BELLARE, M., BOLDYREVA, A., AND O'NEILL, A. Deterministic and efficiently searchable encryption. In CRYPTO (2007), A. Menezes, Ed., Vol. 4622 of Lecture Notes in Computer Science, Springer, pp. 535-552.
    • (2007) CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 28
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • C. Cachin and J. Camenisch, Eds., Vol. 3027 of Lecture Notes in Computer Science, Springer
    • BONEH, D., and CRESCENZO., G. D., OSTROVSKY, R., and PERSIANO, G. Public key encryption with keyword search. In EUROCRYPT (2004), C. Cachin and J. Camenisch, Eds., Vol. 3027 of Lecture Notes in Computer Science, Springer, pp. 506-522.
    • (2004) EUROCRYPT , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 29
    • 85076303225 scopus 로고    scopus 로고
    • Protecting confidential data on personal computers with storage capsules
    • BORDERS, K., VANDER WEELE, E., LAU, B., and PRAKASH, A. Protecting confidential data on personal computers with storage capsules. Ann Arbor 1001 (2009), 48109.
    • (2009) Ann Arbor 1001 , pp. 48109
    • Borders, K.1    Vander Weele, E.2    Lau, B.3    Prakash, A.4
  • 31
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • J. Ioannidis, A. Keromytis, and M. Yung, Eds., Vol. 3531 of Lecture Notes in Computer Science. Springer
    • CHANG, Y.-C., and MITZENMACHER, M. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security, J. Ioannidis, A. Keromytis, and M. Yung, Eds., Vol. 3531 of Lecture Notes in Computer Science. Springer, 2005, pp. 442-455.
    • (2005) Applied Cryptography and Network Security , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 33
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds., ACM
    • CURTMOLA, R., and GARAY., J. A., KAMARA, S., and OSTROVSKY, R. Searchable symmetric encryption: Improved definitions and efficient constructions. In ACM Conference on Computer and Communications Security (2006), A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds., ACM, pp. 79-88.
    • (2006) ACM Conference on Computer and Communications Security , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 38
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart-phones
    • ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart-phones. In OSDI (2010), Vol. 10, pp. 1-6.
    • (2010) OSDI , vol.10 , pp. 1-6
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    Mcdaniel, P.6    Sheth, A.7
  • 42
    • 0346271799 scopus 로고    scopus 로고
    • Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
    • FAULKNER, L. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35, 3 (2003), 379-383.
    • (2003) Behavior Research Methods, Instruments, & Computers , vol.35 , Issue.3 , pp. 379-383
    • Faulkner, L.1
  • 45
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • GOLDREICH, O., and OSTROVSKY, R. Software protection and simulation on oblivious rams. J. ACM 43, 3 (1996), 431-473.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 48
    • 85133874685 scopus 로고    scopus 로고
    • Gyrus: A framework for user-intent monitoring of text-based networked applications
    • JANG, Y., CHUNG, S. P., PAYNE, B. D., AND LEE, W. Gyrus: A framework for user-intent monitoring of text-based networked applications. In NDSS (2014).
    • (2014) NDSS
    • Jang, Y.1    Chung, S.P.2    Payne, B.D.3    Lee, W.4
  • 67
    • 85011343656 scopus 로고    scopus 로고
    • Airbag: Boosting smartphone resistance to malware infection
    • WU, C, ZHOU, Y., PATEL, K., LIANG, Z., and JIANG, X. Airbag: Boosting smartphone resistance to malware infection. In NDSS (2014).
    • (2014) NDSS
    • Wu, C.1    Zhou, Y.2    Patel, K.3    Liang, Z.4    Jiang, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.