shiyonglu / DATAVIEW
DATAVIEW is a big data workflow management system. It uses Dropbox as the data cloud and Amazon EC2 as the compute cloud. Current research focuses on the security and privacy aspects of DATAVIEW as well as performance and cost optimization for running workflows in clouds.
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DATAVIEW
- A Secure Version of DATAVIEW using SGX techniques.☆10Updated 3 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆84Updated 7 years ago
- ☆14Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆110Updated 2 weeks ago
- ☆19Updated 3 weeks ago
- mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)☆91Updated 5 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆664Updated this week
- ACM consolidated LaTeX styles☆64Updated 5 years ago
- Deep Learning with Intel SGX☆21Updated 5 years ago
- ☆11Updated last year
- Efficient and Interactive Zero-Knowledge Proofs☆80Updated 9 months ago
- Privacy-Enhancing Technologies via Applied Cryptography Engineering☆27Updated 2 months ago
- Library for performing Function Secret Sharing (FSS)☆84Updated 5 years ago
- ☆16Updated 2 years ago
- A "Hello World" Intel SGX enclave program☆91Updated 3 years ago
- A Docker image with Intel SGX support.☆69Updated 5 years ago
- Perform multi-party computation on machine learning applications☆21Updated 2 years ago
- CMake file for using Intel SGX on Linux☆50Updated 3 years ago
- CryptoBib BibTex files☆52Updated 3 weeks ago
- A high-throughput oblivious storage system☆23Updated last year
- Sample codes to work with the C++ Paillier Library (http://hms.isi.jhu.edu/acsc/libpaillier/).☆8Updated 4 years ago
- Libra zero knowledge proof system☆48Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆21Updated 6 months ago
- ☆16Updated 3 months ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆13Updated 3 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- ☆17Updated 7 months ago
- Attribute-based Access Control over Named Data Networking☆14Updated 5 months ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Updated 8 years ago