Protecting Outsourced Data Privacy with Lifelong Policy Carrying
暂无分享,去创建一个
Qi Yong | Hang Zhang | Xiaoguang Wang | Yue-hua Dai | Jianbao Ren | Yue-hua Dai | Xiaoguang Wang | Qi Yong | Jianbao Ren | Hang Zhang
[1] Emin Gün Sirer,et al. Logical attestation: an authorization architecture for trustworthy computing , 2011, SOSP.
[2] Kang G. Shin,et al. Using hypervisor to provide data secrecy for user applications on a per-page basis , 2008, VEE '08.
[3] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[4] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[5] Ruby B. Lee,et al. A software-hardware architecture for self-protecting data , 2012, CCS.
[6] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[7] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[8] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[9] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[10] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[11] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[12] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[14] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[15] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[16] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[17] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[18] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[19] Robert Love,et al. Kernel korner: intro to inotify , 2005 .
[20] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[21] Martín Abadi,et al. Authentication in the Taos operating system , 1993, SOSP '93.
[22] Christoforos E. Kozyrakis,et al. Real-World Buffer Overflow Protection for Userspace and Kernelspace , 2008, USENIX Security Symposium.
[23] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[24] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[25] Elaine Shi,et al. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection , 2011, HotOS.