Efficient Security and Privacy Enhancing Solutions in Untrusted Environments

Efficient Security and Privacy Enhancing Solutions in Untrusted Environments

[1]  Seungyeop Han,et al.  SSLShader: Cheap SSL Acceleration with Commodity Processors , 2011, NSDI.

[2]  Brian E. Carpenter,et al.  Internet Transparency , 2000, RFC.

[3]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[4]  Miguel Correia,et al.  SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.

[5]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[6]  Angelos D. Keromytis,et al.  Privacy-Preserving Social Plugins , 2012, USENIX Security Symposium.

[7]  Seungyeop Han,et al.  Expressive privacy control with pseudonyms , 2013, SIGCOMM.

[8]  Ariel J. Feldman,et al.  Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.

[9]  Thomas Narten,et al.  IPv6 Address Assignment to End Sites , 2011, RFC.

[10]  David Wetherall,et al.  Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.

[11]  Craig E. Wills,et al.  Understanding what they do with what they know , 2012, WPES '12.

[12]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[13]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[14]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[15]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[16]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[17]  Emin Gün Sirer,et al.  Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .

[18]  Brian Neil Levine,et al.  Functional Privacy or Why Cookies Are Better with Milk , 2012, HotSec.

[19]  Miguel Castro,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.

[20]  Jon Howell,et al.  Flat Datacenter Storage , 2012, OSDI.

[21]  Seungyeop Han,et al.  MetaSync: File Synchronization Across Multiple Untrusted Storage Services , 2015, USENIX Annual Technical Conference.

[22]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[23]  Barbara Liskov,et al.  Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.

[24]  Seungyeop Han,et al.  MetaSync: Coordinating Storage across Multiple File Synchronization Services , 2016, IEEE Internet Computing.

[25]  Sean Matthew Dorward,et al.  Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .

[26]  Carlo Contavalli,et al.  Maglev: A Fast and Reliable Software Network Load Balancer , 2016, NSDI.

[27]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[28]  Larry L. Peterson,et al.  Syndicate: democratizing cloud storage and caching through service composition , 2013, SoCC.

[29]  Michael E. Kounavis,et al.  Encrypting the internet , 2010, SIGCOMM '10.

[30]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[31]  Balachander Krishnamurthy,et al.  Privacy leakage vs . Protection measures : the growing disconnect , 2011 .

[32]  David Wetherall,et al.  Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default , 2009, Privacy Enhancing Technologies.

[33]  Akira Yamada,et al.  LAP: Lightweight Anonymity and Privacy , 2012, 2012 IEEE Symposium on Security and Privacy.

[34]  Srinath T. V. Setty,et al.  IronFleet: proving practical distributed systems correct , 2015, SOSP.

[35]  Alec Wolman,et al.  MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints , 2016, MobiSys.

[36]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[37]  Irfan Ahmad,et al.  Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.

[38]  Raul Gracia-Tinedo,et al.  Cloud-as-a-Gift: Effectively Exploiting Personal Cloud Free Accounts via REST APIs , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[39]  Dahlia Malkhi,et al.  Active Disk Paxos with infinitely many processes , 2002, PODC '02.

[40]  Martín Abadi,et al.  Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.

[41]  Edgar R. Weippl,et al.  Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.

[42]  Seungyeop Han,et al.  Tor instead of IP , 2011, HotNets-X.

[43]  Balachander Krishnamurthy,et al.  Generating a privacy footprint on the internet , 2006, IMC '06.

[44]  David Mazières,et al.  Replication, history, and grafting in the Ori file system , 2013, SOSP.

[45]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[46]  David Thaler,et al.  Using name-based mappings to increase hit rates , 1998, TNET.

[47]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[48]  Vijay Erramilli,et al.  Detecting price and search discrimination on the internet , 2012, HotNets-XI.

[49]  Ju Wang,et al.  Windows Azure Storage: a highly available cloud storage service with strong consistency , 2011, SOSP.

[50]  D. Wetherall,et al.  A Study of Third-Party Tracking by Mobile Apps in the Wild , 2012 .

[51]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[52]  Srinath T. V. Setty,et al.  Depot: Cloud Storage with Minimal Trust , 2010, TOCS.

[53]  Ethan Katz-Bassett,et al.  SPANStore: cost-effective geo-replicated storage spanning multiple cloud services , 2013, SOSP.

[54]  Pekka Savola,et al.  MTU and Fragmentation Issues with In-the-Network Tunneling , 2006, RFC.

[55]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[56]  Sachin Katti,et al.  Copysets: Reducing the Frequency of Data Loss in Cloud Storage , 2013, USENIX Annual Technical Conference.

[57]  Wouter Joosen,et al.  Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.

[58]  Ariel J. Feldman,et al.  SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.