Top results
andrey brito (federal university of campina grande, brazil) cloudscape brazil, porto alegre, rs july 7th, 2016 secure cloud ⢠main objective improve confidentiality of…
secure cloud database secure query processing in an untrusted (cloud) environment agenda introduction to the model overview of different approaches model data owner / users…
purdue university purdue e-pubs cyber center publications cyber center 5-2014 secure knn query processing in untrusted cloud environments sunoh choi purdue university, [email protected]…
secure knn query processing in untrusted sunoh choi, gabriel ghinita, hyo-sang lim and elisa bertino abstract— mobile devices with geo-positioning capabilities e.g., gps…
cloud terminal: secure access to sensitive applications from untrusted systems lorenzo martignoni∗ pongsin poosankam∗† matei zaharia∗ jun han† stephen mccamant∗…
ar x iv :1 50 6. 00 32 6v 1 [ cs .c r ] 1 j un 2 01 5 secure personal content networking over untrusted devices uichin lee kaist [email protected] joshua joy ucla [email protected]…
secure execution of untrusted code motivation mobile code scenarios java applet / javascript in web page postscript / pdf file email attachment bpf active networks agent…
secure live migration of sgx enclaves on untrusted cloud jinyu gu†‡, zhichao hua†‡, yubin xia†‡, haibo chen†‡, binyu zang†, haibing guan‡ and jinming…
forward-secure signatures with untrusted update xavier boyen ∗ hovav shacham †‡ emily shen § brent waters ¶‖ september 2, 2006 full version of an extended abstract…
secure content distribution using untrusted servers kevin fu mit computer science and artificial intelligence lab in collaboration with m. frans kaashoek (mit), mahesh kallahalla
secure databases in the cloud vasily sidorov @bazzilic http://bazzilic.me/ benefits of the cloud price cloud could be significantly cheaper. consumed availableconsumed availableconsumed…
securecloud secure big data processing in untrusted clouds descriÇÃo confidencialidade integridade e disponibilidade de aplicações e dados são uma preocupação imediata…
powerpoint presentation private editing using untrusted cloud services yan huang and david evans university of virginia http://mightbeevil.com 1 motivation 2 to take advantage…
inktag: secure applications on an untrusted operating system inktag: secure applications on an untrusted operating system paper from the university of texas at austin by:…
powerpoint presentation a secure jailing system for confining untrusted applications guido noordende, ´ad´am balogh, rutger hofman, frances m. t. brazier , and andrew s.…
sessionjuggler: secure web login from an untrusted terminal using session hijacking elie bursztein stanford university [email protected] chinmay soman stanford university…
powerpoint presentation a secure jailing system for confining untrusted applications guido noordende, ´ad´am balogh, rutger hofman, frances m. t. brazier , and andrew s.…
sessionjuggler: secure web login from an untrusted terminal using session hijacking elie bursztein stanford university [email protected] abstract we use modern features
secure execution of untrusted code motivation mobile code scenarios java applet / javascript in web page postscript / pdf file email attachment bpf active networks agent…
sessionjuggler: secure web login from an untrustedterminal using session hijackingelie burszteinstanford [email protected] somanstanford [email protected]…