A Method for Data Access Control and Key Management in Mobile Cloud Storage Services |
Shin, Jaebok
(POSTEC)
Kim, Yungu (POSTEC) Park, Wooram (POSTEC) Park, Chanik (POSTEC) |
1 | ARM, "ARM Fast Model Reference Manual", http://infocenter.arm.com/help/topic/com.arm.doc.dui0423m/DUI0423M_fast_model_rm.pdf |
2 | National Vulnerability Database, http://nvd.nist.gov/ |
3 | CVE-2008-0923:http://eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923 |
4 | The Blue Pill Project: http://bluepillproject.org/ |
5 | Amazon S3, "Using Data Encryption" http://docs.amazonwebserrvices.com/AamzonS3/latest/dev/UsingEncryption.html |
6 | Dropbox. http://www.dropbox.com |
7 | ARM, "ARM Securtiy Technology, Building a Secure System using TrustZone Technology," 2009. |
8 | S. Kinney, "Trusted Platform Module Basics-Using TPM in Embedded Systems," Elsvier, Inc. Oxford, 2006. |
9 | M. Strasser, H. Stamer, "A Software-Based Trusted Platform Module Emulator," TRUST 2008, LNCS, Vol. 4968, pp.33-47, 2008. |
10 | J. Shin, Y. Kim, W. Park, C. Park, "A Secure Data Management Framwork based on ARM TrustZone for Cloud Storage Services", Proceeding of Autumn Conference on IEMEK (in Korean). |
11 | Sierraware, "Open Virtualization for TrustZone Overview," 2011. |
12 | A. Mousa, A. Hamad, "Evaluation of the RC4 Algorithm for Data Encryption," International Journal of Computer Science & Applications, Vol. 3, No. 2, 2006. |