[1] |
郭三强, 郭燕锦. 大数据环境下的数据安全研究[J]. 科技广场, 2013(2):28-31.
|
[2] |
EVANS D, KOLESNIKOV V, ROSULEK M. Apragmatic introduction to secure multi-party computation[J]. Foundations & Trends© in Privacy & Security, 2018, 2(2-3): 70-246.
|
[3] |
SABT M, ACHEMLAL M, BOUABDALLAH A. Trusted execution environment: what it is, and what it is not[C]// Trust, Security And Privacy In Computing And Communications, 2015.
|
[4] |
PINTO S, SANTOS N. Demystifying arm trustZone: a comprehensive survey[J]. ACM Computing Surveys, 2019, 51(6): 1-36.
|
[5] |
COSTAN V, DEVADAS S. Intel SGX explained[J]. Cryptology ePrint Archive, 2016.
|
[6] |
ARNAUTOV S, TRACH B, GREGOR F, et al. SCONE: secure linux containers with Intel SGX[C]// Operating Systems Design and Implementation. USENIX Association, 2016.
|
[7] |
SCHUSTER F, COSTA M, FOURNET C, et al. VC3: trustworthy data analytics in the cloud using SGX[C]. IEEE, 2015.
|
[8] |
ASANOVIC' K, PATTERSON D A. Instruction sets should be free: the case for risc-v[C]. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2014-146, 2014.
|
[9] |
龙蜥操作系统. 携手中科海光, 龙蜥社区正式上线首个 CSV 机密容器解决方案[EB/OL]. [2022-10-10]. https://developer.aliyun.com/article/934682.
|
[10] |
KELEKET GOMA C J Y, 易文哲, 王鹃. 一种基于SGX的轻量Fabric链码可信执行环境构建方法[J]. 信息网络安全, 2022, 22(7):73-83.
|
[11] |
王冠, 梁世豪. 基于SGX的Hadoop KMS安全增强方案[J]. 信息安全研究, 2019, 5(6):514-520.
|
[12] |
王冠, 苗艺雪. 一种基于Intel SGX的Kerberos安全增强方法[P], 2021.
|
[13] |
刘忻, 郭振斌, 宋宇宸. 一种基于SGX的工业物联网身份认证协议[J]. 信息网络安全, 2021(6): 1-10.
|
[14] |
LUO H, WEN G, SU J. Lightweight three factor scheme for real-time data access in wireless sensor networks[J]. Wireless Networks, 2018.
|
[15] |
PODDAR R, BOELTER T, POPA R A. Arx: an encrypted database using semantically secure encryption[J]. Cryptology ePrint Archive, 2016.
|
[16] |
POPA R A, REDFIELD C M, ZELDOVICH N, et al. CryptDB: protecting confidentiality with encrypted query processing[C]// Proceedings of the twenty-third ACM symposium on operating systems principles, 2011: 85-100.
|
[17] |
TU S, KAASHOEK M F, MADDEN S, et al. Processing analytical queries over encrypted data[J]. Proceedings of the VLDB Endowment, 2013.
|
[18] |
PAPADIMITRIOU A, BHAGWAN R, CHANDRAN N, et al. Big data analytics over encrypted datasets with seabed[C]// Operating Systems Design and Implementation, 2016.
|
[19] |
Microsoft. Always encrypted database engine[EB/OL]. [2022-10-10]. https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?redirectedfrom=MSDN&view=sql-server-ver16.
|
[20] |
Google. Encrypted bigQuery client[EB/OL]. [2022-12-10]. https://github.com/google/encrypted-bigquery-client.
|
[21] |
GRUBBS P, SEKNIQI K, BINDSCHAEDLER V, et al. Leakage-abuse attacks against order-revealing encryption[C]// 2017 IEEE Symposium on Security and Privacy (SP), 2017.
|
[22] |
DURAK F B, DUBUISSON T M, CASH D. What else is revealed by order-revealing encryption?[C]// the 2016 ACM SIGSAC Conference, 2016.
|
[23] |
NAVEED M, KAMARA S, WRIGHT C V. Inference attacks on property-preserving encrypted databases[C]// the 22nd ACM SIGSAC Conference, 2015.
|
[24] |
PRIEBE C, VASWANI K, COSTA M. EnclaveDB: a secure database using SGX[C]// 2018 IEEE Symposium on Security and Privacy (SP), 2018.
|
[25] |
Intel. Introduction to gramine[EB/OL]. [2022-10-10]. https://gramine.readthedocs.io/en/stable/index.html.
|
[26] |
Zetetic. SQLCipher[EB/OL]. [2022-10-10]. https://www.zetetic.net/sqlcipher/.
|