trademark
2c2kIhh
2c2kIhh
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
References (cont.)<br />
[KL10] Seny Kamara and Kristin Lauter. Cryptographic cloud storage. Financial Cryptography<br />
and Data Security. Springer Berlin Heidelberg, 2010.<br />
[KS06] Karen Kent and Murugiah Souppaya. Guide to Computer Security Log Management.<br />
NIST, September 2006.<br />
[LLV07] Ninghui Li, Tiancheng Li and Suresh Venkatasubramanian. t-closeness: Privacy<br />
beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd<br />
International Conference on, pp. 106-115. IEEE, 2007.<br />
[LMSV11] Jake Loftus, Alexander May, Nigel P. Smart and Frederik Vercauteren. On ccasecure<br />
somewhat homomorphic encryption. In Ali Miri and Serge Vaudenay, editors,<br />
Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, pages<br />
55–72. Springer, 2011.<br />
[MKG07] A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam. l-diversity:<br />
Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD),<br />
1(1), 3, 2007.<br />
[MR15] Avradip Mandal and Arnab Roy. Relational Hash: Probabilistic Hash for Verifying<br />
Relations, Secure Against Forgery and More. Advances in Cryptology--CRYPTO 2015.<br />
Springer Berlin Heidelberg, 2015.<br />
[NLV11] Michael Naehrig, Kristin Lauter and Vinod Vaikuntanathan. Can homomorphic<br />
encryption be practical? In Christian Cachin and Thomas Ristenpart, editors, CCSW,<br />
pages 113–124. ACM, 2011.<br />
[Per05] Colin Percival. Cache missing for fun and profit. In Proc. of BSDCan 2005, 2005.<br />
[RST01] Ronald L. Rivest, Adi Shamir and Yael Tauman. How to leak a secret. In Colin<br />
Boyd, editor, Advances in Cryptology – ASIACRYPT 2001, volume 2248 of Lecture Notes<br />
in Computer Science, pages 552–565. Springer, December 2001.<br />
[SGLM08] Mark W. Storer, Kevin Greenan, Darrell DE Long and Ethan L. Miller. Secure<br />
data deduplication. In Proceedings of the 4th ACM international workshop on Storage<br />
security and survivability, pp. 1-10. ACM, 2008.<br />
[Sha85] Adi Shamir. Identity-based cryptosystems and signature schemes. In G. R.<br />
Blakley and David Chaum, editors, Advances in Cryptology – CRYPTO’84, volume 196 of<br />
Lecture Notes in Computer Science, pages 47–53. Springer, August 1985.<br />
[SSS11] Emil Stefanov, Elaine Shi and Dawn Song. Towards practical oblivious RAM. arXiv<br />
preprint arXiv:1106.3652 , 2011.<br />
CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />
© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />
62