共 46 条
[1]
[Anonymous], 2016, GUID ACGS
[2]
[Anonymous], 2016, INTEL SOFTWARE GUARD
[3]
[Anonymous], TECH REP
[4]
ARM A, 2009, CISC VIS NETW IND GL
[5]
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
[6]
Bagci I. E., 2015, Proceedings of the 31st Annual Computer Security Applications Conference, P131
[7]
Bajaj S., 2011, Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. SIGMOD'11, P205, DOI DOI 10.1145/1989323.1989346
[8]
CorrectDB: SQL Engine with Practical Query Authentication
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2013, 6 (07)
:529-540
[9]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[10]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1