Reliably determining data leakage in the presence of strong attackers
暂无分享,去创建一个
[1] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[2] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[3] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[4] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[5] Michael J. Feeley,et al. Secure file system versioning at the block level , 2007, EuroSys '07.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Andreas Haeberlen,et al. Secure network provenance , 2011, SOSP.
[8] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[9] Patrick D. McDaniel,et al. Hi-Fi: collecting high-fidelity whole-system provenance , 2012, ACSAC '12.
[10] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[11] Alysson Neves Bessani,et al. State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[12] 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3-5 November 1982 , 1982, FOCS.
[13] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[14] Margo I. Seltzer,et al. Layering in Provenance Systems , 2009, USENIX Annual Technical Conference.
[15] Yuko Suda. The EU Data Protection Directive , 2017 .
[16] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[17] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[18] Jonathan M. Smith,et al. USENIX Association , 2000 .
[19] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[20] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[21] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[22] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[23] Angelos D. Keromytis,et al. CloudFence: Data Flow Tracking as a Cloud Service , 2013, RAID.
[24] Michael Dahlin,et al. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults , 2009, NSDI.
[25] Ramakrishna Kotla,et al. Zyzzyva , 2007, SOSP.
[26] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[27] Margo I. Seltzer,et al. A General-Purpose Provenance Library , 2012, TaPP.
[28] Peter R. Pietzuch,et al. CloudFilter: practical control of sensitive data propagation to the cloud , 2012, CCSW '12.