SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing.
Isaac PolinskyPubali DattaAdam BatesWilliam EnckPublished in: SACMAT (2021)
Keyphrases
- third party
- sensitive data
- data security
- trusted third party
- security requirements
- security issues
- sensitive information
- security level
- personal data
- personal information
- security measures
- security analysis
- security mechanisms
- security services
- security management
- key management
- security properties
- security protocols
- cryptographic protocols
- authentication protocol
- encrypted data
- reverse logistics
- data encryption
- encryption scheme
- security policies
- security model
- key agreement protocol
- access control
- user authentication
- information security
- business intelligence
- key distribution
- data management
- data privacy
- mashup
- private information
- smart card
- privacy preserving
- lightweight