Login / Signup
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing.
Isaac Polinsky
Pubali Datta
Adam Bates
William Enck
Published in:
SACMAT (2021)
Keyphrases
</>
third party
sensitive data
data security
trusted third party
security requirements
security issues
sensitive information
security level
personal data
personal information
security measures
security analysis
security mechanisms
security services
security management
key management
security properties
security protocols
cryptographic protocols
authentication protocol
encrypted data
reverse logistics
data encryption
encryption scheme
security policies
security model
key agreement protocol
access control
user authentication
information security
business intelligence
key distribution
data management
data privacy
mashup
private information
smart card
privacy preserving
lightweight