-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, June
-
R. Agrawal, J. Kierman, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. of ACM SIGMOD 2004, Paris, France, June 2004.
-
(2004)
Proc. of ACM SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
August
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3):239-248, August 1983.
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
3
-
-
17444370055
-
Public-key encryption with keyword search
-
Interlaken, Switzerland, May
-
D. Boneh, G. D. Crescenzo, R. Ostroysky, and G. Persiano. Public-key encryption with keyword search. In Proc. of Eurocrypt 2004, Interlaken, Switzerland, May 2004.
-
(2004)
Proc. of Eurocrypt 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostroysky, R.3
Persiano, G.4
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proc. CRYPTO 01, pages 213-229, 2001.
-
(2001)
Proc. CRYPTO 01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
33646145432
-
Using secret sharing for searching in encrypted data
-
Toronto, Canada, August
-
R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Proc. of the Secure Data Management Workshop, Toronto, Canada, August 2004.
-
(2004)
Proc. of the Secure Data Management Workshop
-
-
Brinkman, R.1
Doumen, J.2
Jonker, W.3
-
7
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
February
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security (TISSEC), 8(1):119-152, February 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
84948123357
-
Implementation of a storage mechanism for untrusted DBMSs
-
Washington DC, USA, May
-
E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia. Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington DC, USA, May 2003.
-
(2003)
Proc. of the Second International IEEE Security in Storage Workshop
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Finetti, M.3
Paraboschi, S.4
Samarati, P.5
Jajodia, S.6
-
9
-
-
33646129220
-
Metadata management in outsourced encrypted databases
-
Trondheim, Norway, September
-
E. Damiani, S. De Capitani di,Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Metadata management in outsourced encrypted databases. In Proc. of the 2nd VLDB Workshop on Secure Data Management (SDM'05), Trondheim, Norway, September 2005.
-
(2005)
Proc. of the 2nd VLDB Workshop on Secure Data Management (SDM'05)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
33244462957
-
Selective release of information in outsourced encrypted databases
-
University of Milan
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Selective release of information in outsourced encrypted databases. Technical report, University of Milan, 2005.
-
(2005)
Technical Report
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, October 27-31
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 27-31 2003.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
0019573099
-
A database encryption system with subkeys
-
June
-
G. Davida, D. Wells, and J. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2):312-328, June 1981.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.1
Wells, D.2
Kam, J.3
-
14
-
-
0036204131
-
Providing database as a service
-
San Jose, CA, USA, February
-
H. Hacigümüs, B. lyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th International Conference on Data Engineering, San Jose, CA, USA, February 2002.
-
(2002)
Proc. of 18th International Conference on Data Engineering
-
-
Hacigümüs, H.1
Lyer, B.2
Mehrotra, S.3
-
15
-
-
84901649420
-
Ensuring the integrity of encrypted databases in the database-as-a- service model
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database-as-a-service model. In DBSec, pages 61-74, 2003.
-
(2003)
DBSec
, pp. 61-74
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
16
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Jeju Island, Korea, March
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Proc. of the 9th International Conference on Database Systems for Advanced Applications, Jeju Island, Korea, March 2004.
-
(2004)
Proc. of the 9th International Conference on Database Systems for Advanced Applications
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI, USA, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, WI, USA, June 2002.
-
(2002)
Proc. of the ACM SIGMOD'2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
18
-
-
84858540250
-
Performance-conscious key management in encrypted databases
-
H. Hacigümüs and S. Mehrotra. Performance-conscious key management in encrypted databases. In DBSec, pages 95-109, 2004.
-
(2004)
DBSec
, pp. 95-109
-
-
Hacigümüs, H.1
Mehrotra, S.2
-
19
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
October
-
L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.2
-
21
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
July
-
M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67(2):99-107, July 2003.
-
(2003)
The Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.1
Yang, W.2
-
22
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
September
-
S. MacKinnon, P.Taylor, H. Meijer, and S.Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
23
-
-
24944520998
-
Authentication and integrity in outsourced database
-
San Diego, CA, USA, February
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced database. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2004.
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
24
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
April
-
R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27(2):95-98, April 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.1
-
25
-
-
77952589508
-
Building an encrypted and searchable audit log
-
San Diego, CA, February
-
B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an encrypted and searchable audit log. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, February 2004.
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
|