메뉴 건너뛰기




Volumn 3674 LNCS, Issue , 2005, Pages 16-32

Metadata management in outsourced encrypted databases

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; INFORMATION MANAGEMENT; INFORMATION SERVICES; OUTSOURCING; SERVERS;

EID: 33646129220     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11552338_2     Document Type: Conference Paper
Times cited : (26)

References (22)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • August
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3):239-248, August 1983.
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 15
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin, USA, June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA, June 2002.
    • (2002) Proc. of the ACM SIGMOD'2002
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 17
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • October
    • L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 19
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • July
    • M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67(2):99-107, July 2003.
    • (2003) The Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.1    Yang, W.2
  • 20
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • September
    • S. MacKinnon, P.Taylor, H. Meijer, and S.Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 22
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • April
    • R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, April 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.