Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments.
Seong Min KimJuhyeng HanJaehyeong HaTaesoo KimDongsu HanPublished in: NSDI (2017)
Keyphrases
- security issues
- outsourced databases
- security concerns
- statistical databases
- network connection
- trusted computing
- preserving privacy
- data security
- security properties
- security and privacy issues
- security mechanisms
- trust relationships
- security risks
- privacy preserving
- information security
- security threats
- sensitive data
- privacy issues
- privacy concerns
- personal data
- personal information
- secure multiparty computation
- privacy requirements
- rfid systems
- security services
- confidential information
- security policies
- data privacy
- security requirements
- electronic payment
- biometric template
- computing environments
- privacy enhancing
- security measures
- security problems
- identity management
- protection mechanisms
- private information
- authentication protocol
- access control
- intrusion detection
- privacy preserving data mining
- third party
- individual privacy
- dynamic environments
- homomorphic encryption
- distributed environment
- cryptographic protocols
- service providers
- security protocols
- information loss
- network security
- trusted platform module
- operating system
- sensitive information
- privacy protection
- differential privacy
- electronic commerce
- security management