Trusted paths for browsers

Z Ye, S Smith, D Anthony - ACM Transactions on Information and System …, 2005 - dl.acm.org
Computer security protocols usually terminate in a computer; however, the human-based
services which they support usually terminate in a human. The gap between the human and …

Protecting client privacy with trusted computing at the server

A Iliev, SW Smith - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Current trusted-computing initiatives usually involve large organizations putting physically
secure hardware on user machines, potentially violating user privacy. Yet, it's possible to …

Incorporating a secure coprocessor in the database-as-a-service model

E Mykletun, G Tsudik - Innovative Architecture for Future …, 2005 - ieeexplore.ieee.org
In this paper, we suggest an extension to the database-as-a-service (DAS) model that
introduces a secure coprocessor (SC) at an untrusted database service provider in order to …

[PDF][PDF] Oblivious search and updates for outsourced tree-structured data on untrusted servers

DT Khanh - IJCSA, 2005 - dangtrankhanh.net
Although tree-based index structures, such as B+-trees, R-trees, have proven their
advantages to both traditional and modern database applications, they introduce numerous …

A practical voting system for small-scale election

CH Chen - ITRE 2005. 3rd International Conference on …, 2005 - ieeexplore.ieee.org
Voting is common in our daily life, from electing president to electing committee; we need to
set up a complete electronic voting scheme suitable for all kinds of voting with safe guaranty …

Hiding tree structured data and queries from untrusted data stores

P Lin, KS Candan - Inf. Secur. J. A Glob. Perspect., 2005 - Taylor & Francis
INTRODUCTION In Web and mobile computing, clients usually do not have sufficient
computation power or memory, and they need remote servers to do the computation or store …

Towards tiny trusted third parties

A Iliev, S Smith - 2005 - digitalcommons.dartmouth.edu
Many security protocols hypothesize the existence of a {\em trusted third party (TTP)} to ease
handling of computation and data too sensitive for the other parties involved. Subsequent …

Privacy-Preserving basic operations on outsourced search trees

DT Khanh - 21st International Conference on Data Engineering …, 2005 - ieeexplore.ieee.org
Security issues in outsourcing database services have recently attracted special attention in
the research community. However, to the best of our knowledge, none of the previous work …

Effizienter unbeobachtbarer Datenbankzugriff

O Berthold - Wirtschaftsinformatik 2005: eEconomy, eGovernment …, 2005 - Springer
Es wird ein effizentes Verfahren zum unbeobachtbaren, privaten Datenbankzugriff (PDA)
vorgestellt. Die Server-Komponente des Systems besteht aus einem oder mehreren …

Privacy-preserving search and updates for outsourced tree-structured data on untrusted servers

TK Dang - … : Third International Conference, iTrust 2005, Paris …, 2005 - Springer
Although tree-based index structures have proven their advantages to both traditional and
modern database applications, they introduce numerous research challenges as database …