Abstract is missing.
- A versatile code execution isolation framework with security firstJohannes Krude, Ulrike Meyer. 1-10 [doi]
- An architecture for concurrent execution of secure environments in cloudsRamya Jayaram Masti, Claudio Marforio, Srdjan Capkun. 11-22 [doi]
- Generalized external interaction with tamper-resistant hardware with bounded information leakageXiangyao Yu, Christopher W. Fletcher, Ling Ren, Marten van Dijk, Srinivas Devadas. 23-34 [doi]
- Authenticated storage using small trusted hardwareHsin-Jung Yang, Victor Costan, Nickolai Zeldovich, Srinivas Devadas. 35-46 [doi]
- CloudSweeper: enabling data-centric document management for secure cloud archivesPeter Snyder, Chris Kanich. 47-54 [doi]
- On the (Im)possibility of privately outsourcing linear programmingPeeter Laud, Alisa Pankova. 55-64 [doi]
- Secure pattern matching using somewhat homomorphic encryptionMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 65-76 [doi]
- Supporting complex queries and access policies for multi-user encrypted databasesMuhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion. 77-88 [doi]
- Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemesSander Wozniak, Michael Rossberg, Sascha Grau, Ali Alshawish, Guenter Schaefer. 89-100 [doi]
- Structural cloud audits that protect private informationHongda Xiao, Bryan Ford, Joan Feigenbaum. 101-112 [doi]
- Cloudoscopy: services discovery and topology mappingAmir Herzberg, Haya Shulman, Johanna Ullrich, Edgar Weippl. 113-122 [doi]