A Secure Jailing System for Confining Untrusted Applications.
Guido van 't NoordendeÁdám BaloghRutger F. H. HofmanFrances M. T. BrazierAndrew S. TanenbaumPublished in: SECRYPT (2007)
Keyphrases
- sensitive data
- third party
- privacy preserving
- security issues
- security requirements
- authentication scheme
- database
- data sets
- security properties
- cryptographic protocols
- security analysis
- private information
- key management
- key exchange
- diffie hellman
- group communication
- sensitive information
- data storage
- data management
- distributed systems
- low cost
- information systems
- real time