Efficient Security and Privacy Enhancing Solutions in Untrusted Environments
暂无分享,去创建一个
[1] Seungyeop Han,et al. SSLShader: Cheap SSL Acceleration with Commodity Processors , 2011, NSDI.
[2] Brian E. Carpenter,et al. Internet Transparency , 2000, RFC.
[3] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[4] Miguel Correia,et al. SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.
[5] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[6] Angelos D. Keromytis,et al. Privacy-Preserving Social Plugins , 2012, USENIX Security Symposium.
[7] Seungyeop Han,et al. Expressive privacy control with pseudonyms , 2013, SIGCOMM.
[8] Ariel J. Feldman,et al. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.
[9] Thomas Narten,et al. IPv6 Address Assignment to End Sites , 2011, RFC.
[10] David Wetherall,et al. Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.
[11] Craig E. Wills,et al. Understanding what they do with what they know , 2012, WPES '12.
[12] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[13] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[14] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[15] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[16] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[17] Emin Gün Sirer,et al. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .
[18] Brian Neil Levine,et al. Functional Privacy or Why Cookies Are Better with Milk , 2012, HotSec.
[19] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[20] Jon Howell,et al. Flat Datacenter Storage , 2012, OSDI.
[21] Seungyeop Han,et al. MetaSync: File Synchronization Across Multiple Untrusted Storage Services , 2015, USENIX Annual Technical Conference.
[22] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[23] Barbara Liskov,et al. Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.
[24] Seungyeop Han,et al. MetaSync: Coordinating Storage across Multiple File Synchronization Services , 2016, IEEE Internet Computing.
[25] Sean Matthew Dorward,et al. Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .
[26] Carlo Contavalli,et al. Maglev: A Fast and Reliable Software Network Load Balancer , 2016, NSDI.
[27] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[28] Larry L. Peterson,et al. Syndicate: democratizing cloud storage and caching through service composition , 2013, SoCC.
[29] Michael E. Kounavis,et al. Encrypting the internet , 2010, SIGCOMM '10.
[30] Thomas Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.
[31] Balachander Krishnamurthy,et al. Privacy leakage vs . Protection measures : the growing disconnect , 2011 .
[32] David Wetherall,et al. Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default , 2009, Privacy Enhancing Technologies.
[33] Akira Yamada,et al. LAP: Lightweight Anonymity and Privacy , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Srinath T. V. Setty,et al. IronFleet: proving practical distributed systems correct , 2015, SOSP.
[35] Alec Wolman,et al. MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints , 2016, MobiSys.
[36] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[37] Irfan Ahmad,et al. Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.
[38] Raul Gracia-Tinedo,et al. Cloud-as-a-Gift: Effectively Exploiting Personal Cloud Free Accounts via REST APIs , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[39] Dahlia Malkhi,et al. Active Disk Paxos with infinitely many processes , 2002, PODC '02.
[40] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[41] Edgar R. Weippl,et al. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.
[42] Seungyeop Han,et al. Tor instead of IP , 2011, HotNets-X.
[43] Balachander Krishnamurthy,et al. Generating a privacy footprint on the internet , 2006, IMC '06.
[44] David Mazières,et al. Replication, history, and grafting in the Ori file system , 2013, SOSP.
[45] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[46] David Thaler,et al. Using name-based mappings to increase hit rates , 1998, TNET.
[47] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[48] Vijay Erramilli,et al. Detecting price and search discrimination on the internet , 2012, HotNets-XI.
[49] Ju Wang,et al. Windows Azure Storage: a highly available cloud storage service with strong consistency , 2011, SOSP.
[50] D. Wetherall,et al. A Study of Third-Party Tracking by Mobile Apps in the Wild , 2012 .
[51] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[52] Srinath T. V. Setty,et al. Depot: Cloud Storage with Minimal Trust , 2010, TOCS.
[53] Ethan Katz-Bassett,et al. SPANStore: cost-effective geo-replicated storage spanning multiple cloud services , 2013, SOSP.
[54] Pekka Savola,et al. MTU and Fragmentation Issues with In-the-Network Tunneling , 2006, RFC.
[55] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[56] Sachin Katti,et al. Copysets: Reducing the Frequency of Data Loss in Cloud Storage , 2013, USENIX Annual Technical Conference.
[57] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[58] Ariel J. Feldman,et al. SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.