Poster : Forcing the Cloud to Forget by Attesting Data Deletion
暂无分享,去创建一个
[1] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[2] Ashish Choudhury,et al. Asynchronous MPC with a strict honest majority using non-equivocation , 2014, PODC '14.
[3] Ghassan O. Karame,et al. Outsourced Proofs of Retrievability , 2014, CCS.
[4] Michael Backes,et al. X-pire! - A digital expiration date for images in social networks , 2011, ArXiv.
[5] Ashish Choudhury,et al. Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity , 2012, IACR Cryptol. ePrint Arch..
[6] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[7] Muriel Médard,et al. Trusted Storage over Untrusted Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[8] Michael Backes,et al. X-pire 2.0: a user-controlled expiration date and copy protection mechanism , 2014, SAC.
[9] Jacob R. Lorch,et al. TrInc: Small Trusted Hardware for Large Distributed Systems , 2009, NSDI.
[10] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[11] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[12] Muriel Médard,et al. Coding for Trusted Storage in Untrusted Networks , 2012, IEEE Transactions on Information Forensics and Security.