Building web applications on top of encrypted data using Mylar

作者: Nickolai Zeldovich , Raluca Ada Popa , Hari Balakrishnan , Steven Valdez , Jonas Helfer

DOI: 10.5555/2616448.2616464

关键词: PortingAdversarySource lines of codeComputer networkConfidentialityEncryptionKeyword searchWeb applicationOperating systemComputer scienceServer

摘要: … Mylar, a new platform for building web applications that stores only encrypted data on the server. Mylar … Mylar addresses the challenges mentioned above with a combination of systems …

参考文章(32)
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller, SPORC: group collaboration using untrusted cloud resources operating systems design and implementation. pp. 337- 350 ,(2010) , 10.5555/1924943.1924967
Petros Maniatis, Byung-Gon Chun, Jayanthkumar Kannan, Secure data preservers forweb services usenix conference on web application development. pp. 3- 3 ,(2011)
Maxwell Krohn, Building secure high-performance web services with OKWS usenix annual technical conference. pp. 15- 15 ,(2004)
Alex Aiken, Yichen Xie, Static detection of security vulnerabilities in scripting languages usenix security symposium. pp. 13- ,(2006)
Srinivas Devadas, Emil Stefanov, Ling Ren, Christopher Fletcher, Marten van Dijk, Xiangyao Yu, Elaine Shi, Path ORAM: An Extremely Simple Oblivious RAM Protocol Other repository. ,(2013)
Emily Stark, From client-side encryption to secure web applications Massachusetts Institute of Technology. ,(2013)
Devdatta Akhawe, Prateek Saxena, Dawn Song, Privilege separation in HTML5 applications usenix security symposium. pp. 23- 23 ,(2012)
Michael Paige, The tangled web: a guide to securing modern web applications by Michal Zalewski ACM Sigsoft Software Engineering Notes. ,vol. 38, pp. 39- 40 ,(2013) , 10.1145/2492248.2492253
Oded Goldreich, Rafail Ostrovsky, Software protection and simulation on oblivious RAMs Journal of the ACM. ,vol. 43, pp. 431- 473 ,(1996) , 10.1145/233551.233553
Craig Gentry, Fully homomorphic encryption using ideal lattices Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. pp. 169- 178 ,(2009) , 10.1145/1536414.1536440