Cryptographically Secure Information Flow Control on Key-Value Stores
暂无分享,去创建一个
Alejandro Russo | Pablo Buiras | Stephen Chong | Lucas Waye | Owen Arden | Lucas Waye | Stephen Chong | Alejandro Russo | Owen Arden | Pablo Buiras
[1] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[2] Alejandro Russo,et al. Functional pearl: two can keep a secret, if one of them uses Haskell , 2015, ICFP.
[3] Andrew C. Myers,et al. Flow-Limited Authorization , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[4] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Peter Williams,et al. The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties , 2009, NDSS.
[6] Aniket Kate,et al. ObliviAd: Provably Secure and Practical Online Behavioral Advertising , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Tom Chothia,et al. Types for Location and Data Security in Cloud Environments , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[8] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[9] Michael Backes,et al. CoSP: a general framework for computational soundness proofs , 2009, CCS.
[10] David Sands,et al. Paralocks: role-based information flow control and beyond , 2010, POPL '10.
[11] Andrew C. Myers,et al. Sharing Mobile Code Securely with Information Flow Control , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[13] Vincent Simonet. The Flow Caml system , 2003 .
[14] Andrew C. Myers,et al. End-to-end availability policies and noninterference , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[15] Silas Boyd-Wickizer,et al. Securing Distributed Systems with Information Flow Control , 2008, NSDI.
[16] Andrew C. Myers,et al. Enforcing Robust Declassification and Qualified Robustness , 2006, J. Comput. Secur..
[17] Robert H. Deng,et al. A new hardware-assisted PIR with O(n) shuffle cost , 2010, International Journal of Information Security.
[18] Stephen Chong,et al. Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[19] Deian Stefan,et al. Disjunction Category Labels , 2011, NordSec.
[20] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[21] Donald E. Porter,et al. Laminar: practical fine-grained decentralized information flow control , 2009, PLDI '09.
[22] Andrew C. Myers,et al. Decentralized robustness , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[23] Winnie Cheng,et al. Abstractions for Usable Information Flow Control in Aeolus , 2012, USENIX Annual Technical Conference.
[24] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[25] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.
[26] Pedro Moreno-Sanchez,et al. Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces , 2015, NDSS.
[27] Alejandro Russo,et al. It's My Privilege: Controlling Downgrading in DC-Labels , 2015, STM.
[28] Jan Vitek,et al. Type-based distributed access control , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[29] Andrei Sabelfeld,et al. Cryptographically-masked flows , 2006, Theor. Comput. Sci..
[30] Dominique Devriese,et al. FlowFox: a web browser with flexible and precise information flow control , 2012, CCS '12.
[31] Steve Zdancewic,et al. A Cryptographic Decentralized Label Model , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[32] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[33] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[34] Robert Tappan Morris,et al. Privacy-preserving browser-side scripting with BFlow , 2009, EuroSys '09.
[35] Deian Stefan,et al. Flexible dynamic information flow control in Haskell , 2012, Haskell '11.
[36] Peeter Laud,et al. On the computational soundness of cryptographically masked flows , 2008, POPL '08.
[37] Xin Qi,et al. Fabric: a platform for secure distributed computation and storage , 2009, SOSP '09.
[38] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[39] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[40] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[41] Arnar Birgisson,et al. JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.
[42] Geoffrey Smith,et al. Secure information flow with random assignment and encryption , 2006, FMSE '06.
[43] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[44] Cédric Fournet,et al. Cryptographically sound implementations for typed information-flow security , 2008, POPL '08.
[45] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[46] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[47] Peter Williams,et al. Usable PIR , 2008, NDSS.
[48] Deian Stefan,et al. Protecting Users by Confining JavaScript with COWL , 2014, OSDI.
[49] Peng Li Yun Mao Steve Zdancewic. Information Integrity Policies , 2003 .
[50] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[51] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[52] Mihir Bellare,et al. Lecture Notes on Cryptography , 2001 .
[53] Deian Stefan,et al. Hails: Protecting Data Privacy in Untrusted Web Applications , 2012, OSDI.
[54] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[55] Danfeng Zhang,et al. Predictive black-box mitigation of timing channels , 2010, CCS '10.
[56] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.
[57] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.