Concerto: A High Concurrency Key-Value Store with Integrity
暂无分享,去创建一个
Ken Eguro | Pingfan Meng | Donald Kossmann | Raghav Kaushik | Arvind Arasu | Ravishankar Ramamurthy | Vineet Pandey | D. Kossmann | A. Arasu | R. Kaushik | Ravishankar Ramamurthy | Vineet Pandey | Ken Eguro | Pingfan Meng
[1] Sunil Prabhakar,et al. Trustworthy data from untrusted databases , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[2] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[3] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[4] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[5] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[6] Radu Sion,et al. CorrectDB: SQL Engine with Practical Query Authentication , 2013, Proc. VLDB Endow..
[7] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[8] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[9] Moni Naor,et al. How Efficient Can Memory Checking Be? , 2009, TCC.
[10] Jonathan Katz,et al. IntegriDB: Verifiable SQL for Outsourced Databases , 2015, CCS.
[11] Stefan Katzenbeisser,et al. Redactable Signatures for Tree-Structured Data: Definitions and Constructions , 2010, ACNS.
[12] Jonathan M. McCune,et al. Memoir: Practical State Continuity for Protected Modules , 2011, 2011 IEEE Symposium on Security and Privacy.
[13] Manuel Blum,et al. Checking the correctness of memories , 2005, Algorithmica.
[14] Srdjan Capkun,et al. Verena: End-to-End Integrity Protection for Web Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[15] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[16] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[17] Leslie Lamport,et al. How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs , 2016, IEEE Transactions on Computers.
[18] Michael T. Goodrich,et al. Athos: Efficient Authentication of Outsourced File Systems , 2008, ISC.
[19] Ramarathnam Venkatesan,et al. FPGAs for trusted cloud computing , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).
[20] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[21] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[22] Sudipta Sengupta,et al. The Bw-Tree: A B-tree for new hardware platforms , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[23] Gene Tsudik,et al. Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.
[24] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[25] Srinivas Devadas,et al. Authenticated storage using small trusted hardware , 2013, CCSW.
[26] Radha Poovendran,et al. The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE) , 2006, RFC.
[27] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[28] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[29] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[30] Elisa Bertino,et al. Leakage-free redactable signatures , 2012, CODASPY '12.
[31] Joachim Posegga,et al. On Structural Signatures for Tree Data Structures , 2012, ACNS.
[32] TsudikGene,et al. Authentication and integrity in outsourced databases , 2006 .
[33] Kyriakos Mouratidis,et al. Scalable Verification for Outsourced Dynamic Databases , 2009, Proc. VLDB Endow..
[34] Eddie Kohler,et al. Speedy transactions in multicore in-memory databases , 2013, SOSP.
[35] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[36] Jan Jannink,et al. Implementing deletion in B+-trees , 1995, SGMD.
[37] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[38] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[39] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[40] Sunil Prabhakar,et al. Ensuring correctness over untrusted private database , 2008, EDBT '08.