![]() |
|
| CCSW'17 Table of Contents Foreword 8th Cloud Computing Security Workshop Organization Session: Cloud Data Security Data
Analytics: Understanding Human Behavior based on Mobile Network Data (Page
1) Co-location
Resistant Strategy with Full Resources Optimization (Page
3) Session: Secure Query Processing, and Web Applications Executing
Boolean Queries on an Encrypted Bitmap Index (Page
11) Poly-Logarithmic
Range Queries on Encrypted Data with Small Leakage (Page
23) Encrypting
Analytical Web Applications (Page
35) |
|
| (Return to Top) | Session: Secure Multitenancy & Cloud Attack Detection Stratum
Filtering: Cloud-based Detection of Attack Sources (Page
47) Oblivious
RAM as a Substrate for Cloud Storage - The Leakage Challenge Ahead (Page
49) Towards
an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments (Page
55) |
| (Return to Top) | Session: Secure Storage and Storage Efficiency On
Information Leakage in Deduplicated Storage Systems (Page
61) Message-Locked
Proofs of Retrievability with Secure Deduplication (Page
73) Generic
Efficient Dynamic Proofs of Retrievability (Page
85) Assured
Deletion in the Cloud: Requirements, Challenges and Future Directions (Page
97)
|