Login / Signup
CCSW
2009
2012
2016
2009
2016
Keyphrases
Publications
2016
Mohamed Ahmed Abdelraheem
,
Christian Gehrmann
,
Malin Lindström
,
Christian Nordahl
Executing Boolean Queries on an Encrypted Bitmap Index.
CCSW
(2016)
Amir Herzberg
,
Haya Shulman
,
Michael Waidner
Stratum Filtering: Cloud-based Detection of Attack Sources.
CCSW
(2016)
Mouhebeddine Berrima
,
Aïcha Katajina Nasr
,
Narjes Ben Rajeb
Co-location Resistant Strategy with Full Resources Optimization.
CCSW
(2016)
Mohammad Etemad
,
Alptekin Küpçü
Generic Efficient Dynamic Proofs of Retrievability.
CCSW
(2016)
Benny Fuhry
,
Walter Tighzert
,
Florian Kerschbaum
Encrypting Analytical Web Applications.
CCSW
(2016)
Luciano Franceschina
Data Analytics: Understanding Human Behavior based on Mobile Network Data.
CCSW
(2016)
Kopo M. Ramokapane
,
Awais Rashid
,
Jose M. Such
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions.
CCSW
(2016)
Marc Sánchez Artigas
Oblivious RAM as a Substrate for Cloud Storage - The Leakage Challenge Ahead.
CCSW
(2016)
Florian Hahn
,
Florian Kerschbaum
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage.
CCSW
(2016)
Dimitrios Vasilopoulos
,
Melek Önen
,
Kaoutar Elkhiyaoui
,
Refik Molva
Message-Locked Proofs of Retrievability with Secure Deduplication.
CCSW
(2016)
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016
CCSW
(2016)
Hubert Ritzdorf
,
Ghassan Karame
,
Claudio Soriente
,
Srdjan Capkun
On Information Leakage in Deduplicated Storage Systems.
CCSW
(2016)
Meryeme Ayache
,
Mohammed Erradi
,
Bernd Freisleben
,
Ahmed Khoumsi
Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments.
CCSW
(2016)
2015
Kenneth Block
,
Guevara Noubir
Return of the Covert Channel, Data Center Style.
CCSW
(2015)
Yong Ho Hwang
,
Sungwook Kim
,
Jae Woo Seo
Fast Order-Preserving Encryption from Uniform Distribution Sampling.
CCSW
(2015)
Frank Li
,
Richard Shin
,
Vern Paxson
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
CCSW
(2015)
Michael K. Reiter
Side Channels in Multi-Tenant Environments.
CCSW
(2015)
Panagiotis Rizomiliotis
,
Stefanos Gritzalis
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.
CCSW
(2015)
Chenxi Wang
Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection.
CCSW
(2015)
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015
CCSW
(2015)
Rashmi Kumari
,
Mohsen Alimomeni
,
Reihaneh Safavi-Naini
Performance Analysis of Linux RNG in Virtualized Environments.
CCSW
(2015)
Dennis Felsch
,
Mario Heiderich
,
Frederic Schulz
,
Jörg Schwenk
How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces.
CCSW
(2015)
2014
David A. McGrew
Privacy vs. Efficacy in Cloud-based Threat Detection.
CCSW
(2014)
Daniel Demmler
,
Amir Herzberg
,
Thomas Schneider
RAID-PIR: Practical Multi-Server PIR.
CCSW
(2014)
Joanne Martin
,
Koos Lodewijkx
Securing Cloud Environments for Enterprise Computing.
CCSW
(2014)
Thomas Groß
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs.
CCSW
(2014)
Yuqiong Sun
,
Giuseppe Petracca
,
Trent Jaeger
Inevitable Failure: The Flawed Trust Assumption in the Cloud.
CCSW
(2014)
Yossi Azar
,
Seny Kamara
,
Ishai Menache
,
Mariana Raykova
,
F. Bruce Shepherd
Co-Location-Resistant Clouds.
CCSW
(2014)
Bryan D. Payne
Reducing the Cost of Security in the Cloud.
CCSW
(2014)
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014
CCSW
(2014)
Christian Priebe
,
Divya Muthukumaran
,
Dan O'Keeffe
,
David M. Eyers
,
Brian Shand
,
Rüdiger Kapitza
,
Peter R. Pietzuch
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants.
CCSW
(2014)
Nathalie Baracaldo
,
Elli Androulaki
,
Joseph S. Glider
,
Alessandro Sorniotti
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage.
CCSW
(2014)
Yi Qian
,
Yupeng Zhang
,
Xi Chen
,
Charalampos Papamanthou
Streaming Authenticated Data Structures: Abstraction and Implementation.
CCSW
(2014)
Christian Mainka
,
Vladislav Mladenov
,
Florian Feldmann
,
Julian Krautwald
,
Jörg Schwenk
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud.
CCSW
(2014)
Thomas P. Jakobsen
,
Jesper Buus Nielsen
,
Claudio Orlandi
A Framework for Outsourcing of Secure Computation.
CCSW
(2014)
Ferdinand Brasser
,
Mihai Bucicoiu
,
Ahmad-Reza Sadeghi
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
CCSW
(2014)
Andreas Mayer
,
Marcus Niemietz
,
Vladislav Mladenov
,
Jörg Schwenk
Guardians of the Clouds: When Identity Providers Fail.
CCSW
(2014)
Yitao Duan
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy.
CCSW
(2014)
Elaine Shi
Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security.
CCSW
(2014)
2013
Ramya Jayaram Masti
,
Claudio Marforio
,
Srdjan Capkun
An architecture for concurrent execution of secure environments in clouds.
CCSW
(2013)
Peter Snyder
,
Chris Kanich
CloudSweeper: enabling data-centric document management for secure cloud archives.
CCSW
(2013)
Xiangyao Yu
,
Christopher W. Fletcher
,
Ling Ren
,
Marten van Dijk
,
Srinivas Devadas
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
CCSW
(2013)
Johannes Krude
,
Ulrike Meyer
A versatile code execution isolation framework with security first.
CCSW
(2013)
Amir Herzberg
,
Haya Shulman
,
Johanna Ullrich
,
Edgar R. Weippl
Cloudoscopy: services discovery and topology mapping.
CCSW
(2013)
CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013
CCSW
(2013)
Sander Wozniak
,
Michael Rossberg
,
Sascha Grau
,
Ali Alshawish
,
Guenter Schaefer
Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes.
CCSW
(2013)
Muhammad Rizwan Asghar
,
Giovanni Russello
,
Bruno Crispo
,
Mihaela Ion
Supporting complex queries and access policies for multi-user encrypted databases.
CCSW
(2013)
Hongda Xiao
,
Bryan Ford
,
Joan Feigenbaum
Structural cloud audits that protect private information.
CCSW
(2013)
Masaya Yasuda
,
Takeshi Shimoyama
,
Jun Kogure
,
Kazuhiro Yokoyama
,
Takeshi Koshiba
Secure pattern matching using somewhat homomorphic encryption.
CCSW
(2013)
Peeter Laud
,
Alisa Pankova
On the (Im)possibility of privately outsourcing linear programming.
CCSW
(2013)