Building Web Applications on Top of Encrypted Data Using Mylar
暂无分享,去创建一个
Hari Balakrishnan | Nickolai Zeldovich | Raluca A. Popa | Emily Stark | Jonas Helfer | Steven Valdez | H. Balakrishnan | N. Zeldovich | R. A. Popa | Jonas Helfer | S. Valdez | Emily Stark
[1] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[2] Srinath T. V. Setty,et al. Depot: Cloud Storage with Minimal Trust , 2010, TOCS.
[3] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[4] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[5] Mihai Christodorescu,et al. Private Use of Untrusted Web Servers via Opportunistic Encryption , 2008 .
[6] Robert Tappan Morris,et al. Privacy-preserving browser-side scripting with BFlow , 2009, EuroSys '09.
[7] Dawn Xiaodong Song,et al. Privilege Separation in HTML5 Applications , 2012, USENIX Security Symposium.
[8] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[9] Ben Y. Zhao,et al. Silverline: toward data confidentiality in storage-intensive cloud applications , 2011, SoCC.
[10] Nickolai Zeldovich,et al. Multi-Key Searchable Encryption , 2013, IACR Cryptol. ePrint Arch..
[11] Ramarathnam Venkatesan,et al. Orthogonal Security with Cipherbase , 2013, CIDR.
[12] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[13] Maxwell N. Krohn,et al. Building Secure High-Performance Web Services with OKWS , 2004, USENIX Annual Technical Conference, General Track.
[14] Vitaly Shmatikov,et al. Breaking Web Applications Built On Top of Encrypted Data , 2016, CCS.
[15] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[16] Markulf Kohlweiss,et al. Scramble! Your Social Network Data , 2011, PETS.
[17] Adam Chlipala,et al. Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications , 2010, OSDI.
[18] Dawn Xiaodong Song,et al. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[20] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[21] Srdjan Capkun,et al. Verena: End-to-End Integrity Protection for Web Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[22] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[23] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[24] Byung-Gon Chun,et al. Secure Data Preservers for Web Services , 2011, WebApps.
[25] Collin Jackson,et al. Securing frame communication in browsers , 2008, CACM.
[26] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[27] W. Morain,et al. A tangled web. , 2001, Annals of plastic surgery.
[28] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[29] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[30] Ariel J. Feldman,et al. SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.
[31] Emily Stark. From client-side encryption to secure web applications , 2013 .
[32] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[33] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[34] Dan Boneh,et al. Symmetric Cryptography in Javascript , 2009, 2009 Annual Computer Security Applications Conference.
[35] N. Kruger,et al. The tangled web , 1997 .