Radu Sion

According to our database1, Radu Sion
  • authored at least 104 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries.
PoPETs, 2017

SeqORAM: A Locality-Preserving Write-Only Oblivious RAM.
CoRR, 2017

DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries.
CoRR, 2017

dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Practical Foundations of History Independence.
IEEE Trans. Information Forensics and Security, 2016

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016

POSTER: DroidShield: Protecting User Applications from Normal World Access.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: DataLair: A Storage Block Device with Plausible Deniability.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Introspections on the Semantic Gap.
IEEE Security & Privacy, 2015

HiFlash: A History Independent Flash Device.
CoRR, 2015

Practical Foundations of History Independence.
CoRR, 2015

Quantitative Musings on the Feasibility of Smartphone Clouds.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Private Badges for Geosocial Networks.
IEEE Trans. Mob. Comput., 2014

TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality.
IEEE Trans. Knowl. Data Eng., 2014

SoK: Introspections on Trust and the Semantic Gap.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

CloudFlow: Cloud-wide Policy Enforcement Using Fast VM Introspection.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

DIMMer: A case for turning off DIMMs in clouds.
Proceedings of the ACM Symposium on Cloud Computing, 2014

Costs and Security in Clouds.
Proceedings of the Secure Cloud Computing, 2014

2013
Access privacy and correctness on untrusted storage.
ACM Trans. Inf. Syst. Secur., 2013

CorrectDB: SQL Engine with Practical Query Authentication.
PVLDB, 2013

To Cloud Or Not To? Musings on Clouds, Security and Big Data.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

LiPS: A Cost-Efficient Data and Task Co-Scheduler for MapReduce.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

Ficklebase: Looking into the future to erase the past.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

To cloud my big data or not to?: musings at the intersection of big data, intense computing and clouds.
Proceedings of the ScienceCloud'13, 2013

LiPS: A cost-efficient data and task co-scheduler for MapReduce.
Proceedings of the 20th Annual International Conference on High Performance Computing, 2013

HIFS: history independence for file systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Toward Private Joins on Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2012

Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances.
IEEE Trans. Information Forensics and Security, 2012

Tipping Pennies? Privately Practical Anonymous Micropayments.
IEEE Trans. Information Forensics and Security, 2012

On Securing Untrusted Clouds with Cryptography.
IEEE Data Eng. Bull., 2012

PrivateFS: a parallel oblivious file system.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Single round access privacy on outsourced storage.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

The Shy Mayor: Private Badges in GeoSocial Networks.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Secure Data Outsourcing: A Brief Overview.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Practical Oblivious Outsourced Storage.
ACM Trans. Inf. Syst. Secur., 2011

Write-Once Read-Many Oblivious RAM.
IEEE Trans. Information Forensics and Security, 2011

TrustedDB: A Trusted Hardware based Outsourced Database Engine.
PVLDB, 2011

Conditional e-payments with transferability.
J. Parallel Distrib. Comput., 2011

TrustedDB: a trusted hardware based database with privacy and data confidentiality.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Enhancement of Xen's scheduler for MapReduce workloads.
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011

Private geosocial networking.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Oblivious Outsourced Storage with Delegation.
Proceedings of the Financial Cryptography and Data Security, 2011

To cloud or not to cloud?: musings on costs and viability.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Regulatory Compliance.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Collaborative location certification for sensor networks.
TOSN, 2010

On securing untrusted clouds with cryptography.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

The PUF Promise.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Joining Privately on Outsourced Data.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Regulatory Compliant Oblivious RAM.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Trusted Hardware.
Proceedings of the Encyclopedia of Database Systems, 2009

Steganography.
Proceedings of the Encyclopedia of Database Systems, 2009

Regulatory Compliance in Data Management.
Proceedings of the Encyclopedia of Database Systems, 2009

Digital Rights Management.
Proceedings of the Encyclopedia of Database Systems, 2009

Preventing history forgery with secure provenance.
TOS, 2009

Remembrance: The Unbearable Sentience of Being Digital
CoRR, 2009

A personal mobile DRM manager for smartphones.
Computers & Security, 2009

XPay: practical anonymous payments for tor routing and other networked services.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties.
Proceedings of the Network and Distributed System Security Symposium, 2009

The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Remembrance: The Unbearable Sentience of Being Digital.
Proceedings of the CIDR 2009, 2009

2008
Database Watermarking for Copyright Protection.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Towards Secure Data Outsourcing.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy Records Retention.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Usable PIR.
Proceedings of the Network and Distributed System Security Symposium, 2008

Strong WORM.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Rights Assessment for Relational Data.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

A grid-based approach for enterprise-scale data mining.
Future Generation Comp. Syst., 2007

Regulatory-Compliant Data Management.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

NS2: Networked Searchable Store with Correctness.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Secure Data Outsourcing.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Introducing secure provenance: problems and challenges.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Requirements of Secure Storage Systems for Healthcare Records.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

On the Practicality of Private Information Retrieval.
Proceedings of the Network and Distributed System Security Symposium, 2007

Conditional E-Cash.
Proceedings of the Financial Cryptography and Data Security, 2007

Personal Digital Rights Management for Mobile Cellular Devices.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Rights Protection for Discrete Numeric Streams.
IEEE Trans. Knowl. Data Eng., 2006

Uncheatable Reputation for Distributed Computation Markets.
Proceedings of the Financial Cryptography and Data Security, 2006

XG: A Grid-Enabled Query Processing Engine.
Proceedings of the Advances in Database Technology, 2006

Secure Data Outsourcing.
Proceedings of the 13th International Conference on Management of Data, 2006

2005
Rights Protection for Categorical Data.
IEEE Trans. Knowl. Data Eng., 2005

Query Execution Assurance for Outsourced Databases.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Evolving Toward the Perfect Schedule: Co-scheduling Job Assignments and Data Replication in Wide-Area Systems Using a Genetic Algorithm.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2005

Dynamic Stochastic Models for Workflow Response Optimization.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

XG: A Data-Driven Computation Grid for Enterprise-Scale Mining.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

2004
Rights Protection for Relational Data.
IEEE Trans. Knowl. Data Eng., 2004

Digital Rights Protection.
IEEE Data Eng. Bull., 2004

Resilient Rights Protection for Sensor Streams.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada, August 31, 2004

Attacking digital watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

wmdb.: Rights Protection for Numeric Relational Data.
Proceedings of the 20th International Conference on Data Engineering, 2004

Proving Ownership over Categorical Data.
Proceedings of the 20th International Conference on Data Engineering, 2004

QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases.
Proceedings of the Advances in Database Technology, 2004

2003
Rights Protection for Relational Data.
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003

Resilient Information Hiding for Abstract Semi-structures.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

On-the-fly Intrusion Detection for Web Portals.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

2002
Issues and Evaluations of Caching Solutions for Web Application Acceleration.
Proceedings of the VLDB 2002, 2002

On Watermarking Numeric Sets.
Proceedings of the Digital Watermarking, First International Workshop, 2002

Power: A Metric for Evaluating Watermarking Algorithms.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Natural Language Watermarking and Tamperproofing.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2000
The Bond Agent System and Applications.
Proceedings of the Agent Systems, 2000


  Loading...