26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

References (cont.)<br />

[KL10] Seny Kamara and Kristin Lauter. Cryptographic cloud storage. Financial Cryptography<br />

and Data Security. Springer Berlin Heidelberg, 2010.<br />

[KS06] Karen Kent and Murugiah Souppaya. Guide to Computer Security Log Management.<br />

NIST, September 2006.<br />

[LLV07] Ninghui Li, Tiancheng Li and Suresh Venkatasubramanian. t-closeness: Privacy<br />

beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd<br />

International Conference on, pp. 106-115. IEEE, 2007.<br />

[LMSV11] Jake Loftus, Alexander May, Nigel P. Smart and Frederik Vercauteren. On ccasecure<br />

somewhat homomorphic encryption. In Ali Miri and Serge Vaudenay, editors,<br />

Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, pages<br />

55–72. Springer, 2011.<br />

[MKG07] A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam. l-diversity:<br />

Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD),<br />

1(1), 3, 2007.<br />

[MR15] Avradip Mandal and Arnab Roy. Relational Hash: Probabilistic Hash for Verifying<br />

Relations, Secure Against Forgery and More. Advances in Cryptology--CRYPTO 2015.<br />

Springer Berlin Heidelberg, 2015.<br />

[NLV11] Michael Naehrig, Kristin Lauter and Vinod Vaikuntanathan. Can homomorphic<br />

encryption be practical? In Christian Cachin and Thomas Ristenpart, editors, CCSW,<br />

pages 113–124. ACM, 2011.<br />

[Per05] Colin Percival. Cache missing for fun and profit. In Proc. of BSDCan 2005, 2005.<br />

[RST01] Ronald L. Rivest, Adi Shamir and Yael Tauman. How to leak a secret. In Colin<br />

Boyd, editor, Advances in Cryptology – ASIACRYPT 2001, volume 2248 of Lecture Notes<br />

in Computer Science, pages 552–565. Springer, December 2001.<br />

[SGLM08] Mark W. Storer, Kevin Greenan, Darrell DE Long and Ethan L. Miller. Secure<br />

data deduplication. In Proceedings of the 4th ACM international workshop on Storage<br />

security and survivability, pp. 1-10. ACM, 2008.<br />

[Sha85] Adi Shamir. Identity-based cryptosystems and signature schemes. In G. R.<br />

Blakley and David Chaum, editors, Advances in Cryptology – CRYPTO’84, volume 196 of<br />

Lecture Notes in Computer Science, pages 47–53. Springer, August 1985.<br />

[SSS11] Emil Stefanov, Elaine Shi and Dawn Song. Towards practical oblivious RAM. arXiv<br />

preprint arXiv:1106.3652 , 2011.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!