Secure and Resilient Cloud Computing for the Department of Defense
暂无分享,去创建一个
Robert K. Cunningham | Arkady Yerukhimovich | Vijay Gadepally | Thomas Moyer | Nabil Schear | Patrick T. Cable
[1] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[2] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[3] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[4] Roger Khazan,et al. Lincoln Open Cryptographic Key Management Architecture , 2012 .
[5] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[6] Joseph P. Campbell,et al. Iris Biometric Security Challenges and Possible Solutions , 2015 .
[7] Robert K. Cunningham,et al. Computing on masked data: a high performance method for improving big data veracity , 2014, 2014 IEEE High Performance Extreme Computing Conference (HPEC).
[8] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[9] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[10] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[11] Trent Jaeger,et al. Justifying Integrity Using a Virtual Machine Verifier , 2009, 2009 Annual Computer Security Applications Conference.
[12] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[13] Kevin M. Carter,et al. Probabilistic Threat Propagation for Network Security , 2014, IEEE Transactions on Information Forensics and Security.
[14] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[15] Arkady Yerukhimovich,et al. A survey of cryptographic approaches to securing big-data analytics in the cloud , 2014, 2014 IEEE High Performance Extreme Computing Conference (HPEC).
[16] Robert K. Cunningham,et al. Automated Assessment of Secure Search Systems , 2015, OPSR.
[17] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[18] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[19] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[20] M. Goodrich,et al. Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .