enter search term and/or author name
Improved proxy re-encryption schemes with applications to secure distributed storage
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We...
Auditing sum-queries to make a statistical database secure
Francesco M. Malvestuto, Mauro Mezzini, Marina Moscarini
In response to queries asked to a statistical database, the query system should avoid releasing summary statistics that could lead to the disclosure of confidential individual data. Attacks to the security of a statistical database may be direct or...
Anomalous system call detection
Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Kruegel
Intrusion detection systems (IDSs) are used to detect traces of malicious activities targeted against the network and its resources. Anomaly-based IDSs build models of the expected behavior of applications by analyzing events that are generated...
Foundations and applications for secure triggers
Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential...