-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, June
-
R. Agrawal, J. Kierman, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. of ACM SIGMOND 2004, Paris, France, June 2004.
-
(2004)
Proc. of ACM SIGMOND 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
August
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3):239-248, August 1983.
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
4
-
-
33646145432
-
Using secret sharing for searching in encrypted data
-
Toronto, Canada, August
-
R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Proc. of the Secure Data Management Workshop, Toronto, Canada, August 2004.
-
(2004)
Proc. of the Secure Data Management Workshop
-
-
Brinkman, R.1
Doumen, J.2
Jonker, W.3
-
6
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
February
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security (TISSEC), 8(1):119-152, February 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
33244462957
-
Selective release of information in outsourced encrypted database
-
University of Milan
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and P. Samarati. Selective release of information in outsourced encrypted database. Technical report, University of Milan, 2005.
-
(2005)
Technical Report
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Samarati, P.5
-
8
-
-
84948123357
-
Implementation of a storage mechanism for untrusted DBMSs
-
Washington DC, USA, May
-
E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia. Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington DC, USA, May 2003.
-
(2003)
Proc. of the Second International IEEE Security in Storage Workshop
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Finetti, M.3
Paraboschi, S.4
Samarati, P.5
Jajodia, S.6
-
9
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, October 27-31
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 27-31 2003.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
0019573099
-
A database encryption system with subkeys
-
June
-
G.I. Davida, D.L. Wells, and J.B. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2):312-328, June 1981.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
12
-
-
0036204131
-
Providing database as a service
-
San Jose, California, USA, February
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th International Conference on Data Engineering, San Jose, California, USA, February 2002.
-
(2002)
Proc. of 18th International Conference on Data Engineering
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
14
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Jeju Island, Korea, March
-
H. Hacigumus, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Proc. of the 9th International Conference on Database Systems for Advanced Applications, Jeju Island, Korea, March 2004.
-
(2004)
Proc. of the 9th International Conference on Database Systems for Advanced Applications
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
15
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA, June 2002.
-
(2002)
Proc. of the ACM SIGMOD'2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
17
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
October
-
L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.2
-
19
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
July
-
M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67(2):99-107, July 2003.
-
(2003)
The Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.1
Yang, W.2
-
20
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
September
-
S. MacKinnon, P.Taylor, H. Meijer, and S.Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
21
-
-
24944520998
-
Authentication and integrity in out-sourced database
-
San Diego, California, USA, February
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in out-sourced database. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, California, USA, February 2004.
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
22
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
April
-
R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, April 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
|