-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
AGGARWAL, G., BAWA, M., GANESAN, P., GARCIA-MOLINA, H., KENTHAPADI, K., MOTWANI, R., SRIVASTAVA, U., THOMAS, D., AND XU, Y. 2005. Two can keep a secret: A distributed architecture for secure database services. Conference on Innovative Data Systems Research (CIDR).
-
(2005)
Conference on Innovative Data Systems Research (CIDR)
-
-
AGGARWAL, G.1
BAWA, M.2
GANESAN, P.3
GARCIA-MOLINA, H.4
KENTHAPADI, K.5
MOTWANI, R.6
SRIVASTAVA, U.7
THOMAS, D.8
XU, Y.9
-
4
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
AGRAWAL, R., BIRD, P., GRANDISON, T., KIEMAN, J., LOGAN, S., AND RJAIBI, W. 2005. Extending relational database systems to automatically enforce privacy policies. 21st International Conference on Data Engineering (ICDE).
-
(2005)
21st International Conference on Data Engineering (ICDE)
-
-
AGRAWAL, R.1
BIRD, P.2
GRANDISON, T.3
KIEMAN, J.4
LOGAN, S.5
RJAIBI, W.6
-
6
-
-
0242674432
-
Hippocratic databases
-
AGRAWAL, R., KIEMAN, J., SRIKANT, R., AND XU, Y. 2002. Hippocratic databases. International Conference on Very Large Databases (VLDB).
-
(2002)
International Conference on Very Large Databases (VLDB)
-
-
AGRAWAL, R.1
KIEMAN, J.2
SRIKANT, R.3
XU, Y.4
-
7
-
-
3142716056
-
Order-preserving encryption for numeric data
-
AGRAWAL, R., KIERNAN, J., SRIKANT, R., AND XU, Y. 2004. Order-preserving encryption for numeric data. ACM SIGMOD International Conference on Management of Data.
-
(2004)
ACM SIGMOD International Conference on Management of Data
-
-
AGRAWAL, R.1
KIERNAN, J.2
SRIKANT, R.3
XU, Y.4
-
9
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
BERTINO, E., OOI, B., YANG, Y., AND DENG, R. H. 2005. Privacy and ownership preserving of outsourced medical data. International Conference on Data Engineering (ICDE).
-
(2005)
International Conference on Data Engineering (ICDE)
-
-
BERTINO, E.1
OOI, B.2
YANG, Y.3
DENG, R.H.4
-
12
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
CLIFTON, C., KANTARCIOGLU, M., LIN, X., VAIDYA, J., AND ZHU, M. 2003. Tools for privacy preserving distributed data mining. SIGKDD Explorations.
-
(2003)
SIGKDD Explorations
-
-
CLIFTON, C.1
KANTARCIOGLU, M.2
LIN, X.3
VAIDYA, J.4
ZHU, M.5
-
13
-
-
84976834622
-
Self-stabilizing systems in spite of distributed control
-
DIJKSTRA, E. W. 1974. Self-stabilizing systems in spite of distributed control. Commun. ACM 17, 11.
-
(1974)
Commun. ACM
, vol.17
, pp. 11
-
-
DIJKSTRA, E.W.1
-
15
-
-
0003555523
-
-
EDS, 1st Ed. Morgan Kaufmann
-
ELMAGARMID, A., RUSINKIEWICZ, M., AND SHETH, A., EDS. 1999. Management of Heterogeneous and Autonomous Database Systems 1st Ed. Morgan Kaufmann.
-
(1999)
Management of Heterogeneous and Autonomous Database Systems
-
-
ELMAGARMID, A.1
RUSINKIEWICZ, M.2
SHETH, A.3
-
17
-
-
34548286758
-
-
GOLDREICH, O. 2001. Secure multi-party computation. Working Draft, version 1.3
-
GOLDREICH, O. 2001. Secure multi-party computation. Working Draft, version 1.3.
-
-
-
-
18
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
HACIGUMUS, H., IYER, B., LI, C., AND MEHROTRA, S. 2002. Executing SQL over encrypted data in the database service provider model. ACM SIGMOD Conference on Management of Data.
-
(2002)
ACM SIGMOD Conference on Management of Data
-
-
HACIGUMUS, H.1
IYER, B.2
LI, C.3
MEHROTRA, S.4
-
20
-
-
29844457918
-
Enterprise information integration: Successes, challenges and controversies
-
HALEVY, A. Y., ASHISH, N., BITTON, D., CAREY, M. J., DRAPER, D., POLLOCK, J., ROSENTHAL, A., AND SIKKA, V. 2005. Enterprise information integration: successes, challenges and controversies. ACM SIGMOD International Conference on Management of Data.
-
(2005)
ACM SIGMOD International Conference on Management of Data
-
-
HALEVY, A.Y.1
ASHISH, N.2
BITTON, D.3
CAREY, M.J.4
DRAPER, D.5
POLLOCK, J.6
ROSENTHAL, A.7
SIKKA, V.8
-
23
-
-
4544361334
-
Privacy preserving data mining of association rules on horizontally partitioned data
-
KANTARCIOGLU, M. AND CLIFTON, C. 2004a. Privacy preserving data mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Engin. 16, 9.
-
(2004)
IEEE Trans. Knowl. Data Engin
, vol.16
, pp. 9
-
-
KANTARCIOGLU, M.1
CLIFTON, C.2
-
24
-
-
34247399538
-
Security issues in querying encrypted data
-
Tech. rep. TR-04-013, Purdue University
-
KANTARCIOGLU, M. AND CLIFTON, C. 2004b. Security issues in querying encrypted data. Tech. rep. TR-04-013, Purdue University.
-
(2004)
-
-
KANTARCIOGLU, M.1
CLIFTON, C.2
-
27
-
-
33746437508
-
Privacy preserving data mining
-
LINDELL, Y. AND PINKAS, B. 2002. Privacy preserving data mining. J. Crypto. 15, 3.
-
(2002)
J. Crypto
, vol.15
, pp. 3
-
-
LINDELL, Y.1
PINKAS, B.2
-
29
-
-
34548281971
-
-
MARKEY, E. J. 2005. Outsourcing privacy: Countries processing U.S. social security numbers, health information, tax records lack fundamental privacy safeguards. A staff report prepared at the request of Edward J. Markey, U.S. House of Representatives.
-
MARKEY, E. J. 2005. Outsourcing privacy: Countries processing U.S. social security numbers, health information, tax records lack fundamental privacy safeguards. A staff report prepared at the request of Edward J. Markey, U.S. House of Representatives.
-
-
-
-
37
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. 2003. Defending anonymous communications against passive logging attacks. IEEE Symposium on Security and Privacy.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
40
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust in peer-to-peer communities
-
XIONG, L. AND LIU, L. 2004. PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans. Knowl. Data Engin. 16, 7.
-
(2004)
IEEE Trans. Knowl. Data Engin
, vol.16
, pp. 7
-
-
XIONG, L.1
LIU, L.2
|