Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers.
Anasuya AcharyaCarmit HazayVladimir KolesnikovManoj PrabhakaranPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- information security
- insider attacks
- malicious users
- third party
- malicious activities
- security requirements
- security issues
- databases
- security policies
- data center
- service providers
- intrusion detection
- access control
- malicious attacks
- network security
- steady state
- computer security
- denial of service attacks
- security architecture
- identity theft
- single point of failure
- cloud computing