{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:20:29Z","timestamp":1730323229710,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","funder":[{"name":"BPIFRANCE","award":["DOS0092102\/03"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3423211.3425667","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:03:11Z","timestamp":1607727791000},"page":"29-43","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Practical Active Revocation"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Contiu","sequence":"first","affiliation":[{"name":"Scille, France"}]},{"given":"Laurent","family":"R\u00e9veill\u00e8re","sequence":"additional","affiliation":[{"name":"University of Bordeaux, France"}]},{"given":"Etienne","family":"Rivi\u00e8re","sequence":"additional","affiliation":[{"name":"ICTEAM, UCLouvain Belgium"}]}],"member":"320","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_1_2_1","unstructured":"AutismSpeaks. [n. d.]. https:\/\/www.autismspeaks.org\/ AutismSpeaks. [n. d.]. https:\/\/www.autismspeaks.org\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994549"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978377"},{"volume-title":"International Conference on Security and Privacy in Communication Systems (SecureComm). Springer.","year":"2016","author":"Bacis Enrico","key":"e_1_3_2_1_5_1","unstructured":"Enrico Bacis , Sabrina De Capitani di Vimercati , Sara Foresti , Stefano Paraboschi , Marco Rosa , and Pierangela Samarati . 2016 . Access control management for secure cloud storage . In International Conference on Security and Privacy in Communication Systems (SecureComm). Springer. Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, and Pierangela Samarati. 2016. Access control management for secure cloud storage. In International Conference on Security and Privacy in Communication Systems (SecureComm). Springer."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2014.6903736"},{"volume-title":"USENIX Annual Technical Conference. 169--180","year":"2014","author":"Bessani Alysson Neves","key":"e_1_3_2_1_8_1","unstructured":"Alysson Neves Bessani , Ricardo Mendes , Tiago Oliveira , Nuno Ferreira Neves , Miguel Correia , Marcelo Pasin , and Paulo Verissimo . 2014 . SCFS: A Shared Cloud-backed File System .. In USENIX Annual Technical Conference. 169--180 . Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, and Paulo Verissimo. 2014. SCFS: A Shared Cloud-backed File System.. In USENIX Annual Technical Conference. 169--180."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"volume-title":"Advances in Cryptology-CRYPTO","author":"Boneh Dan","key":"e_1_3_2_1_10_1","unstructured":"Dan Boneh , Kevin Lewi , Hart Montgomery , and Ananth Raghunathan . 2013. Key homomorphic PRFs and their applications . In Advances in Cryptology-CRYPTO . Springer , 410--428. Dan Boneh, Kevin Lewi, Hart Montgomery, and Ananth Raghunathan. 2013. Key homomorphic PRFs and their applications. In Advances in Cryptology-CRYPTO. Springer, 410--428."},{"volume-title":"USENIX Security Symposium.","year":"1996","author":"Boneh Dan","key":"e_1_3_2_1_11_1","unstructured":"Dan Boneh and Richard J Lipton . 1996 . A Revocable Backup System .. In USENIX Security Symposium. Dan Boneh and Richard J Lipton. 1996. A Revocable Backup System.. In USENIX Security Symposium."},{"volume-title":"Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing. In International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE.","year":"2019","author":"Bouchaala Mariem","key":"e_1_3_2_1_12_1","unstructured":"Mariem Bouchaala , Cherif Ghazel , and Leila Azouz Saidane . 2019 . Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing. In International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE. Mariem Bouchaala, Cherif Ghazel, and Leila Azouz Saidane. 2019. Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing. In International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_32"},{"volume-title":"11th USENIX Workshop on Offensive Technologies (WOOTS).","year":"2017","author":"Brasser Ferdinand","key":"e_1_3_2_1_14_1","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software grand exposure: SGX cache attacks are practical . In 11th USENIX Workshop on Offensive Technologies (WOOTS). Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies (WOOTS)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00032"},{"key":"e_1_3_2_1_19_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"IACR Cryptology ePrint Archive"},{"volume-title":"Insider Attacks in Cloud Computing. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trust-Com).","year":"2012","author":"Duncan Adrian J.","key":"e_1_3_2_1_20_1","unstructured":"Adrian J. Duncan , Sadie Creese , and Michael Goldsmith . 2012 . Insider Attacks in Cloud Computing. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trust-Com). Adrian J. Duncan, Sadie Creese, and Michael Goldsmith. 2012. Insider Attacks in Cloud Computing. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trust-Com)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.54"},{"volume-title":"2017 Cache attacks on Intel SGX In 10th European Workshop on Systems Security (EuroSec). ACM","author":"G\u00f6tzfried Johannes","key":"e_1_3_2_1_23_1","unstructured":"Johannes G\u00f6tzfried , Moritz Eckert , Sebastian Schinzel , and Tilo M\u00fcller . 2017 Cache attacks on Intel SGX In 10th European Workshop on Systems Security (EuroSec). ACM . Johannes G\u00f6tzfried, Moritz Eckert, Sebastian Schinzel, and Tilo M\u00fcller. 2017 Cache attacks on Intel SGX In 10th European Workshop on Systems Security (EuroSec). ACM."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241208"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"volume-title":"AONT-RS: Blending Security and Performance in Dispersed Storage Systems. In 9th USENIX Conference on File and Storage Technologies (FAST).","year":"2011","author":"Plank Jason Resch James S","key":"e_1_3_2_1_27_1","unstructured":"James S Plank Jason Resch . 2011 . AONT-RS: Blending Security and Performance in Dispersed Storage Systems. In 9th USENIX Conference on File and Storage Technologies (FAST). James S Plank Jason Resch. 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. In 9th USENIX Conference on File and Storage Technologies (FAST)."},{"edition":"1","volume-title":"ZooKeeper: Distributed Process Coordination","author":"Junqueira Flavio","key":"e_1_3_2_1_28_1","unstructured":"Flavio Junqueira and Benjamin Reed . 2013. ZooKeeper: Distributed Process Coordination ( 1 st ed.). O'Reilly Media, Inc. Flavio Junqueira and Benjamin Reed. 2013. ZooKeeper: Distributed Process Coordination (1st ed.). O'Reilly Media, Inc."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"B Kaliski and J Staddon. 1998. RFC2437: PKCS# 1: RSA Encryption. B Kaliski and J Staddon. 1998. RFC2437: PKCS# 1: RSA Encryption.","DOI":"10.17487\/rfc2313"},{"volume-title":"Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. In 10th International Symposium on Cyberspace Safety and Security (CSS). Springer.","year":"2018","author":"Kapusta Katarzyna","key":"e_1_3_2_1_30_1","unstructured":"Katarzyna Kapusta and Gerard Memmi . 2018 . Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. In 10th International Symposium on Cyberspace Safety and Security (CSS). Springer. Katarzyna Kapusta and Gerard Memmi. 2018. Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. In 10th International Symposium on Cyberspace Safety and Security (CSS). Springer."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763850"},{"volume-title":"26th USENIX Security Symposium, USENIX Security. 16--18","year":"2017","author":"Lee Sangho","key":"e_1_3_2_1_32_1","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In 26th USENIX Security Symposium, USENIX Security. 16--18 . Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In 26th USENIX Security Symposium, USENIX Security. 16--18."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.62"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.45"},{"volume-title":"2018 USENIX Annual Technical Conference (ATC).","year":"2018","author":"Oleksenko Oleksii","key":"e_1_3_2_1_35_1","unstructured":"Oleksii Oleksenko , Bohdan Trach , Robert Krahn , Mark Silberstein , and Christof Fetzer . 2018 . Varys: Protecting SGX enclaves from practical side-channel attacks . In 2018 USENIX Annual Technical Conference (ATC). Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX enclaves from practical side-channel attacks. In 2018 USENIX Annual Technical Conference (ATC)."},{"volume-title":"4th USENIX Conference on File and Storage Technologies (FAST).","year":"2005","author":"Peterson Zachary NJ","key":"e_1_3_2_1_36_1","unstructured":"Zachary NJ Peterson , Randal C Burns , Joseph Herring , Adam Stubble-field, and Aviel D Rubin . 2005 . Secure Deletion for a Versioning File System .. In 4th USENIX Conference on File and Storage Technologies (FAST). Zachary NJ Peterson, Randal C Burns, Joseph Herring, Adam Stubble-field, and Aviel D Rubin. 2005. Secure Deletion for a Versioning File System.. In 4th USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_3_2_1_37_1","unstructured":"Planet. [n. d.]. https:\/\/www.planet.com\/ Planet. [n. d.]. https:\/\/www.planet.com\/"},{"volume-title":"All-or-nothing data protection for ubiquitous communication: challenges and perspectives. Information Sciences 502","year":"2019","author":"Qiu Han","key":"e_1_3_2_1_38_1","unstructured":"Han Qiu , Katarzyna Kapusta , Zhihui Lu , Meikang Qiu , and Gerard Memmi . 2019. All-or-nothing data protection for ubiquitous communication: challenges and perspectives. Information Sciences 502 ( 2019 ). Han Qiu, Katarzyna Kapusta, Zhihui Lu, Meikang Qiu, and Gerard Memmi. 2019. All-or-nothing data protection for ubiquitous communication: challenges and perspectives. Information Sciences 502 (2019)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0098-8"},{"volume-title":"21st USENIX Security Symposium. USENIX Association, 17--17","year":"2012","author":"Reardon Joel","key":"e_1_3_2_1_40_1","unstructured":"Joel Reardon , Srdjan Capkun , and David Basin . 2012 . Data node encrypted file system: Efficient secure deletion for flash memory . In 21st USENIX Security Symposium. USENIX Association, 17--17 . Joel Reardon, Srdjan Capkun, and David Basin. 2012. Data node encrypted file system: Efficient secure deletion for flash memory. In 21st USENIX Security Symposium. USENIX Association, 17--17."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052348"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"volume-title":"Public auditing for shared cloud data with efficient and secure group management. Information Sciences 472","year":"2019","author":"Tian Hui","key":"e_1_3_2_1_45_1","unstructured":"Hui Tian , Fulin Nan , Hong Jiang , Chin-Chen Chang , Jianting Ning , and Yongfeng Huang . 2019. Public auditing for shared cloud data with efficient and secure group management. Information Sciences 472 ( 2019 ). Hui Tian, Fulin Nan, Hong Jiang, Chin-Chen Chang, Jianting Ning, and Yongfeng Huang. 2019. Public auditing for shared cloud data with efficient and secure group management. Information Sciences 472 (2019)."},{"key":"e_1_3_2_1_46_1","unstructured":"Troy Toman. 2017. Our Data From Space Lives in Google Cloud. https:\/\/www.planet.com\/pulse\/planets-data-from-space-lives-in-google-cloud\/. Troy Toman. 2017. Our Data From Space Lives in Google Cloud. https:\/\/www.planet.com\/pulse\/planets-data-from-space-lives-in-google-cloud\/."},{"volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association.","year":"2018","author":"Bulck Jo Van","key":"e_1_3_2_1_47_1","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proceedings of the 27th USENIX Security Symposium. USENIX Association. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"volume-title":"International Conference on Security and Privacy in Communication Systems. Springer.","year":"2011","author":"Zarandioon Saman","key":"e_1_3_2_1_49_1","unstructured":"Saman Zarandioon , Danfeng Daphne Yao , and Vinod Ganapathy . 2011 . K2C: Cryptographic cloud storage with lazy revocation and anonymous access . In International Conference on Security and Privacy in Communication Systems. Springer. Saman Zarandioon, Danfeng Daphne Yao, and Vinod Ganapathy. 2011. K2C: Cryptographic cloud storage with lazy revocation and anonymous access. In International Conference on Security and Privacy in Communication Systems. Springer."}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 21st International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423211.3425667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T17:46:36Z","timestamp":1673459196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":47,"alternative-id":["10.1145\/3423211.3425667","10.1145\/3423211"],"URL":"https:\/\/doi.org\/10.1145\/3423211.3425667","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}