I/O for virtual machine monitors: Security and performance issues
PA Karger, DR Safford - IEEE Security & Privacy, 2008 - ieeexplore.ieee.org
Modern I/O architectures are quite complex, so keeping a virtual machine monitor (VMM), or
hypervisor, small is difficult. Many current hypervisors move the large, complex, and …
hypervisor, small is difficult. Many current hypervisors move the large, complex, and …
Privacy preserving joins
Y Li, M Chen - 2008 IEEE 24th International Conference on …, 2008 - ieeexplore.ieee.org
In this paper, we design a system for mutually distrustful entities to perform privacy
preserving joins, leveraging the power of a memory-limited secure coprocessor. Under this …
preserving joins, leveraging the power of a memory-limited secure coprocessor. Under this …
[PDF][PDF] Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants.
S Böttcher, S Obermeier - J. Softw., 2008 - researchgate.net
The computation of the union operator for different distributed datasets involves two
challenges when participants are curious and can even act malicious: guaranteeing …
challenges when participants are curious and can even act malicious: guaranteeing …
Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD)
Computer-aided diagnostic (CAD) schemes often employ a filter for enhancement of lesions
as a preprocessing step for improving sensitivity and specificity. The filter enhances objects …
as a preprocessing step for improving sensitivity and specificity. The filter enhances objects …
An efficient PIR construction using trusted hardware
For a private information retrieval (PIR) scheme to be deployed in practice, low
communication complexity and low computation complexity are two fundamental …
communication complexity and low computation complexity are two fundamental …
Shifting inference control to user side: Architecture and protocol
Inference has been a longstanding issue in database security, and inference control, aiming
to curb inference, provides an extra line of defense to the confidentiality of databases by …
to curb inference, provides an extra line of defense to the confidentiality of databases by …
Providing query assurance for outsourced tree-indexed data
TK Dang, NT Son - Modeling, Simulation and Optimization of Complex …, 2008 - Springer
Outsourcing database services is emerging as an important new trend thanks to continued
developments of the Internet and advances in the networking technology. In this outsourced …
developments of the Internet and advances in the networking technology. In this outsourced …
[图书][B] Privacy preserving joins on secure coprocessors
Y Li - 2008 - search.proquest.com
The field of privacy preserving joins (PPJ) considers the question of how mutually distrustful
entities share data in a privacy preserving way such that no party learns more than what can …
entities share data in a privacy preserving way such that no party learns more than what can …
[PDF][PDF] Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors
PA Karger, DR Safford - 2008 - dominoweb.draco.res.ibm.com
VMMs have become an attractive way to improve system security by providing strong
isolation between different guest operating systems. However, the primary reason to believe …
isolation between different guest operating systems. However, the primary reason to believe …
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract The Trusted Computing Group (TCG) defines the specifications for the Trusted
Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled …
Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled …