:facetid:toc:\"db/conf/ccs/ccsw2015.bht\"OK:facetid:toc:db/conf/ccs/ccsw2015.bhtKenneth BlockGuevara NoubirReturn of the Covert Channel, Data Center Style.CCSW17-282015Conference and Workshop Papersclosedconf/ccs/BlockN1510.1145/2808425.2808433https://doi.org/10.1145/2808425.2808433https://dblp.org/rec/conf/ccs/BlockN15URL#3527644Dennis FelschMario HeiderichFrederic SchulzJörg SchwenkHow Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces.CCSW5-162015Conference and Workshop Papersclosedconf/ccs/FelschHSS1510.1145/2808425.2808432https://doi.org/10.1145/2808425.2808432https://dblp.org/rec/conf/ccs/FelschHSS15URL#3527707Yong Ho HwangSungwook KimJae Woo SeoFast Order-Preserving Encryption from Uniform Distribution Sampling.CCSW41-522015Conference and Workshop Papersclosedconf/ccs/HwangKS1510.1145/2808425.2808431https://doi.org/10.1145/2808425.2808431https://dblp.org/rec/conf/ccs/HwangKS15URL#3527743Rashmi KumariMohsen AlimomeniReihaneh Safavi-NainiPerformance Analysis of Linux RNG in Virtualized Environments.CCSW29-392015Conference and Workshop Papersclosedconf/ccs/KumariAS1510.1145/2808425.2808434https://doi.org/10.1145/2808425.2808434https://dblp.org/rec/conf/ccs/KumariAS15URL#3527772Frank Li 0001Richard ShinVern PaxsonExploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.CCSW53-642015Conference and Workshop Papersclosedconf/ccs/LiSP1510.1145/2808425.2808430https://doi.org/10.1145/2808425.2808430https://dblp.org/rec/conf/ccs/LiSP15URL#3527786Michael K. ReiterSide Channels in Multi-Tenant Environments.CCSW12015Conference and Workshop Papersclosedconf/ccs/Reiter1510.1145/2808425.2808426https://doi.org/10.1145/2808425.2808426https://dblp.org/rec/conf/ccs/Reiter15URL#3527849Panagiotis RizomiliotisStefanos GritzalisORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.CCSW65-762015Conference and Workshop Papersclosedconf/ccs/RizomiliotisG1510.1145/2808425.2808429https://doi.org/10.1145/2808425.2808429https://dblp.org/rec/conf/ccs/RizomiliotisG15URL#3527853Chenxi WangCloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection.CCSW32015Conference and Workshop Papersclosedconf/ccs/Wang15a10.1145/2808425.2808427https://doi.org/10.1145/2808425.2808427https://dblp.org/rec/conf/ccs/Wang15aURL#3527905Indrajit RayXiaofeng WangKui Ren 0001Florian KerschbaumCristina Nita-RotaruProceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015CCSWACM2015Editorshipconf/ccs/2015ccsw10.1145/2808425https://doi.org/10.1145/2808425https://dblp.org/rec/conf/ccs/2015ccswURL#3669135