I/O for virtual machine monitors: Security and performance issues

PA Karger, DR Safford - IEEE Security & Privacy, 2008 - ieeexplore.ieee.org
Modern I/O architectures are quite complex, so keeping a virtual machine monitor (VMM), or
hypervisor, small is difficult. Many current hypervisors move the large, complex, and …

Privacy preserving joins

Y Li, M Chen - 2008 IEEE 24th International Conference on …, 2008 - ieeexplore.ieee.org
In this paper, we design a system for mutually distrustful entities to perform privacy
preserving joins, leveraging the power of a memory-limited secure coprocessor. Under this …

[PDF][PDF] Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants.

S Böttcher, S Obermeier - J. Softw., 2008 - researchgate.net
The computation of the union operator for different distributed datasets involves two
challenges when participants are curious and can even act malicious: guaranteeing …

Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD)

K Suzuki, Z Shi, J Zhang - 2008 19th International Conference …, 2008 - ieeexplore.ieee.org
Computer-aided diagnostic (CAD) schemes often employ a filter for enhancement of lesions
as a preprocessing step for improving sensitivity and specificity. The filter enhances objects …

An efficient PIR construction using trusted hardware

Y Yang, X Ding, RH Deng, F Bao - International Conference on …, 2008 - Springer
For a private information retrieval (PIR) scheme to be deployed in practice, low
communication complexity and low computation complexity are two fundamental …

Shifting inference control to user side: Architecture and protocol

Y Yang, Y Li, RH Deng, F Bao - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Inference has been a longstanding issue in database security, and inference control, aiming
to curb inference, provides an extra line of defense to the confidentiality of databases by …

Providing query assurance for outsourced tree-indexed data

TK Dang, NT Son - Modeling, Simulation and Optimization of Complex …, 2008 - Springer
Outsourcing database services is emerging as an important new trend thanks to continued
developments of the Internet and advances in the networking technology. In this outsourced …

[图书][B] Privacy preserving joins on secure coprocessors

Y Li - 2008 - search.proquest.com
The field of privacy preserving joins (PPJ) considers the question of how mutually distrustful
entities share data in a privacy preserving way such that no party learns more than what can …

[PDF][PDF] Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors

PA Karger, DR Safford - 2008 - dominoweb.draco.res.ibm.com
VMMs have become an attractive way to improve system security by providing strong
isolation between different guest operating systems. However, the primary reason to believe …

Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM

Y Wu, F Bao, RH Deng, M Mouffron… - Information Security and …, 2008 - Springer
Abstract The Trusted Computing Group (TCG) defines the specifications for the Trusted
Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled …