메뉴 건너뛰기




Volumn 8, Issue 1, 2005, Pages 119-152

Modeling and assessing inference exposure in encrypted databases

Author keywords

Cryptography; Database service; Indexing; Inference

Indexed keywords

DATA INTEGRITY; DATABASE SERVICES; INFERENCE; SERVICE PROVIDERS;

EID: 16644381926     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1053283.1053289     Document Type: Article
Times cited : (118)

References (30)
  • 4
    • 0033904599 scopus 로고    scopus 로고
    • A ptas for the multiple subset sum problem with different knapsack capacities
    • CAPRARA, A., KELLERER, H., AND PFERSCHY, U. 2000. A ptas for the multiple subset sum problem with different knapsack capacities. Inf. Process. Lett. 73, 111-118.
    • (2000) Inf. Process. Lett. , vol.73 , pp. 111-118
    • Caprara, A.1    Kellerer, H.2    Pferschy, U.3
  • 5
    • 0037354149 scopus 로고    scopus 로고
    • A 3/4-approximation algorithm for multiple subset sum
    • CAPRARA, A., KELLERER, H., AND PFERSCHY, U. 2003. A 3/4-approximation algorithm for multiple subset sum. J. Heuristics 9, 99-111.
    • (2003) J. Heuristics , vol.9 , pp. 99-111
    • Caprara, A.1    Kellerer, H.2    Pferschy, U.3
  • 10
    • 0019573099 scopus 로고
    • A database encryption system with subkeys
    • DAVIDA, G., WELLS, D., AND KAM, J. 1981. A database encryption system with subkeys. ACM Trans. Database Syst. 6, 2 (June), 312-328.
    • (1981) ACM Trans. Database Syst. , vol.6 , Issue.2 JUNE , pp. 312-328
    • Davida, G.1    Wells, D.2    Kam, J.3
  • 12
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • DOMINGO-FERRER, J. 1996. A new privacy homomorphism and applications. Inf. Process. Lett. 60, 5 (Dec.), 277-282.
    • (1996) Inf. Process. Lett. , vol.60 , Issue.5 DEC , pp. 277-282
    • Domingo-Ferrer, J.1
  • 16
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, WI. ACM Press, New York
    • HACIGÜMÜS, H., IYER, B., LI, C., AND MEHROTRA, S. 2002a. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD'2002, Madison, WI. ACM Press, New York.
    • (2002) Proceedings of the ACM SIGMOD'2002
    • Hacigümüs, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 21
    • 0024690043 scopus 로고
    • Storing text retrieval systems on CD-ROM: Compression and encryption considerations
    • KLEIN, S., BOOKSTEIN, A., AND DEERWESTER, S. 1989. Storing text retrieval systems on CD-ROM: compression and encryption considerations. ACM Trans. Inf. Syst. 7, 3 (July), 230-245.
    • (1989) ACM Trans. Inf. Syst. , vol.7 , Issue.3 JULY , pp. 230-245
    • Klein, S.1    Bookstein, A.2    Deerwester, S.3
  • 22
    • 0002603293 scopus 로고
    • Practical graph isomorphism
    • MCKAY, B. 1981. Practical graph isomorphism. Congressus Numerantium 30, 45-87.
    • (1981) Congressus Numerantium , vol.30 , pp. 45-87
    • Mckay, B.1
  • 23
    • 0004218571 scopus 로고
    • Ph.D. thesis, DIKU, University of Copenhagen, Copenhagen, Denmark. Report 95/1
    • PISINGER, D. 1995. Algorithms for knapsack problems. Ph.D. thesis, DIKU, University of Copenhagen, Copenhagen, Denmark. Report 95/1.
    • (1995) Algorithms for Knapsack Problems
    • Pisinger, D.1
  • 25
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondent's privacy in microdata release
    • SAMARATI, P. 2001. Protecting respondent's privacy in microdata release. IEEE Trans. Knowledge Data Eng. 13, 6 (Nov./Dec.), 1010-1017.
    • (2001) IEEE Trans. Knowledge Data Eng. , vol.13 , Issue.6 NOV.-DEC , pp. 1010-1017
    • Samarati, P.1
  • 26
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA
    • SONG, D., WAGNER, D., AND PERRIG, A. 2000. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA. 44-55.
    • (2000) Proceedings of the 2000 IEEE Symposium on Security and Privacy , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 27
    • 0016870630 scopus 로고
    • An algorithm for subgraph isomorphism
    • ULLMAN, J. 1976. An algorithm for subgraph isomorphism. J. ACM 23, 31-42.
    • (1976) J. ACM , vol.23 , pp. 31-42
    • Ullman, J.1
  • 30
    • 0001270387 scopus 로고
    • Congruent graphs and the connectivity of graphs
    • WHITNEY, H. 1932. Congruent graphs and the connectivity of graphs. Am. J. Math. 54, 150-168.
    • (1932) Am. J. Math. , vol.54 , pp. 150-168
    • Whitney, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.