메뉴 건너뛰기




Volumn , Issue , 2013, Pages 501-514

Πbox: A platform for privacy-preserving apps

Author keywords

[No Author keywords available]

Indexed keywords

DIFFERENTIAL PRIVACIES; NEW APPLICATIONS; PRIVACY PRESERVING; PROTOTYPE IMPLEMENTATIONS; THEORETICAL ALGORITHMS; USER PRIVACY;

EID: 85076688797     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (42)

References (62)
  • 4
    • 77957936026 scopus 로고    scopus 로고
    • Google App Engine. https://developers.google.com/appengine.
    • Google App Engine
  • 5
    • 84874786070 scopus 로고    scopus 로고
    • Obliviad: Provably secure and practical online behavioral advertising
    • M. Backes, A. Kate, M. Maffei, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S&P, 2012.
    • (2012) S&P
    • Backes, M.1    Kate, A.2    Maffei, M.3    Pecina, K.4
  • 6
    • 80052677847 scopus 로고    scopus 로고
    • Information-theoretic bounds for differentially private mechanisms
    • G. Barthe and B. Kopf. Information-theoretic bounds for differentially private mechanisms. In CSF, 2011.
    • (2011) CSF
    • Barthe, G.1    Kopf, B.2
  • 7
    • 77956209107 scopus 로고    scopus 로고
    • Discovering frequent patterns in sensitive data
    • R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering frequent patterns in sensitive data. In KDD, 2010.
    • (2010) KDD
    • Bhaskar, R.1    Laxman, S.2    Smith, A.3    Thakurta, A.4
  • 9
    • 84910659277 scopus 로고    scopus 로고
    • Towards statistical queries over distributed private user data
    • R. Chen, A. Reznichenko, P. Francis, and J. Gehrke. Towards statistical queries over distributed private user data. In NSDI, 2012.
    • (2012) NSDI
    • Chen, R.1    Reznichenko, A.2    Francis, P.3    Gehrke, J.4
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communication of the ACM, 19(5), May 1976.
    • (1976) Communication of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 13
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, 2003.
    • (2003) PODS
    • Dinur, I.1    Nissim, K.2
  • 14
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 15
    • 33746086554 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
    • (2006) TCC
    • Dwork, C.1    Mcsherry, F.2    Nissim, K.3    Smith, A.4
  • 16
    • 77954717626 scopus 로고    scopus 로고
    • Differential privacy under continual observation
    • C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In STOC, 2010.
    • (2010) STOC
    • Dwork, C.1    Naor, M.2    Pitassi, T.3    Rothblum, G.N.4
  • 18
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 20
    • 84865024594 scopus 로고    scopus 로고
    • Android permissions: User attention, comprehension, and behavior
    • A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In SOUPS, 2012.
    • (2012) SOUPS
    • Felt, A.P.1    Ha, E.2    Egelman, S.3    Haney, A.4    Chin, E.5    Wagner, D.6
  • 22
    • 84943299684 scopus 로고    scopus 로고
    • Privad: Practical privacy in online advertising
    • S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.
    • (2011) NSDI
    • Guha, S.1    Cheng, B.2    Francis, P.3
  • 23
    • 85076709531 scopus 로고    scopus 로고
    • HBase. http://hbase.apache.org.
  • 25
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications. In CCS, 2011.
    • (2011) CCS
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 26
    • 85076709246 scopus 로고    scopus 로고
    • Embassies: Radically refactoring the web
    • J. Howell, B. Parno, and J. R. Douceur. Embassies: Radically refactoring the web. In NSDI, 2013.
    • (2013) NSDI
    • Howell, J.1    Parno, B.2    Douceur, J.R.3
  • 27
    • 0026156690 scopus 로고
    • Reducing timing channels with fuzzy time
    • W.-M. Hu. Reducing timing channels with fuzzy time. In S&P, 1991.
    • (1991) S&P
    • Hu, W.-M.1
  • 29
    • 85076717894 scopus 로고    scopus 로고
    • Jetty. http://www.eclipse.org/jetty.
  • 30
    • 84871902633 scopus 로고    scopus 로고
    • Privacy violations using microtargeted ads: A case study
    • A. Korolova. Privacy violations using microtargeted ads: A case study. Journal of Privacy and Confidentiality, 3(1), 2011.
    • (2011) Journal of Privacy and Confidentiality , vol.3 , Issue.1
    • Korolova, A.1
  • 31
    • 70449657350 scopus 로고    scopus 로고
    • Noninterference for a practical DIFC-based operating system
    • M. Krohn and E. Tromer. Noninterference for a practical DIFC-based operating system. In S&P, 2009.
    • (2009) S&P
    • Krohn, M.1    Tromer, E.2
  • 33
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct
    • B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10), Oct. 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10
    • Lampson, B.W.1
  • 34
    • 85076682807 scopus 로고    scopus 로고
    • App sandbox in depth. http://developer.apple.com/library/mac/ #documentation/Security/Conceptual/ AppSandboxDesignGuide/AppSandboxInDepth/ AppSandboxInDepth.html.
    • App Sandbox in Depth
  • 35
    • 77956293777 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • Sept
    • F. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Commun. ACM, 53(9), Sept. 2010.
    • (2010) Commun. ACM , vol.53 , Issue.9
    • McSherry, F.1
  • 37
    • 80052803379 scopus 로고    scopus 로고
    • Do windows users follow the principle of least privilege? investigating user account control practices
    • S. Motiee, K. Hawkey, and K. Beznosov. Do Windows users follow the principle of least privilege? Investigating User Account Control practices. In SOUPS, 2010.
    • (2010) SOUPS
    • Motiee, S.1    Hawkey, K.2    Beznosov, K.3
  • 38
    • 0002934582 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • A. C. Myers and B. Liskov. A decentralized model for information flow control. In SOSP, 1997.
    • (1997) SOSP
    • Myers, A.C.1    Liskov, B.2
  • 40
    • 85076691707 scopus 로고    scopus 로고
    • OpenStreetMap. http://www.openstreetmap. org.
  • 41
    • 85076680944 scopus 로고    scopus 로고
    • https://play.google.com/store/apps/details? id=net.osmand&hl=en
    • OsmAnd. http://osmand.net, https://play.google.com/store/apps/details? id=net.osmand&hl=en.
  • 44
    • 82655162816 scopus 로고    scopus 로고
    • CryptDB: Protecting confidentiality with encrypted query processing
    • R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: Protecting confidentiality with encrypted query processing. In SOSP, 2011.
    • (2011) SOSP
    • Popa, R.A.1    Redfield, C.M.S.2    Zeldovich, N.3    Balakrishnan, H.4
  • 46
    • 80755143986 scopus 로고    scopus 로고
    • Auctions in do-not-track compliant internet advertising
    • A. Reznichenko, S. Guha, and P. Francis. Auctions in do-not-track compliant internet advertising. In CCS, 2011.
    • (2011) CCS
    • Reznichenko, A.1    Guha, S.2    Francis, P.3
  • 47
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In CCS, 2009.
    • (2009) CCS
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 51
    • 85076687795 scopus 로고    scopus 로고
    • https://play.google.com/store/apps/details?id=net. sourceforge.servestream&hl=en
    • ServeStream. http://sourceforge.net/projects/servestream, https://play.google.com/store/apps/details?id=net. sourceforge.servestream&hl=en.
  • 52
    • 85076289299 scopus 로고    scopus 로고
    • XBook: Redesigning privacy control in social networking platforms
    • K. Singh, S. Bhola, and W. Lee. xBook: Redesigning privacy control in social networking platforms. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Singh, K.1    Bhola, S.2    Lee, W.3
  • 57
    • 84866604942 scopus 로고    scopus 로고
    • Keeping information safe from social networking apps
    • B. Viswanath, E. Kiciman, and S. Saroiu. Keeping information safe from social networking apps. In WOSN, 2012.
    • (2012) WOSN
    • Viswanath, B.1    Kiciman, E.2    Saroiu, S.3
  • 58
    • 85076671169 scopus 로고    scopus 로고
    • VMware Horizon Mobile. https://blogs.vmware.com/euc/2012/08/ vmware-horizon-mobile-on-ios.html.
    • VMware Horizon Mobile
  • 61
    • 82655179240 scopus 로고    scopus 로고
    • CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
    • F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
    • (2011) SOSP
    • Zhang, F.1    Chen, J.2    Chen, H.3    Zang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.