-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
August
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1 3), 239-248 (August 1983).
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
2
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Alexandria, VA, USA November
-
M.J. Atallah, K.B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. of the ACM CCS, Alexandria, VA, USA (November 2005).
-
(2005)
Proc. of the ACM CCS
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
3
-
-
36248929860
-
Hierarchy-based access control in distributed environments
-
Helsinki, Finland June
-
J.C. Birget, X. Zou, G. Noubir, and B. Ramamurthy. Hierarchy-based access control in distributed environments. In Proc. of the IEEE International Conference on Communications, Helsinki, Finland (June 2002).
-
(2002)
Proc. of the IEEE International Conference on Communications
-
-
Birget, J.C.1
Zou, X.2
Noubir, G.3
Ramamurthy, B.4
-
4
-
-
17444370055
-
Public-key encryption with keyword search
-
Interlaken, Switzerland May
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-key encryption with keyword search. In Proc. Eurocrypt 2004, Interlaken, Switzerland (May 2004).
-
(2004)
Proc. Eurocrypt 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
33947109885
-
Chip-secured data access: Confidential data on untrusted servers
-
Hong Kong, China August
-
L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the 28th VLDB Conference, Hong Kong, China (August 2002).
-
(2002)
Proc. of the 28th VLDB Conference
-
-
Bouganim, L.1
Pucheral, P.2
-
6
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
February
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM TISSEC, 8(1), 119-152 (February 2005).
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA October
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the ACM CCS, Washington, DC, USA (October 2003).
-
(2003)
Proc. of the ACM CCS
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
0019057051
-
The design of a cryptography based secure file system
-
September
-
E. Gudes. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, 6(5), 411-420 (September 1980).
-
(1980)
IEEE Transactions on Software Engineering
, vol.6
, Issue.5
, pp. 411-420
-
-
Gudes, E.1
-
9
-
-
0036204131
-
Providing database as a service
-
San Jose, CA, USA February
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the ICDE, San Jose, CA, USA (February 2002).
-
(2002)
Proc. of the ICDE
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD, Madison, Wisconsin, USA (June 2002).
-
(2002)
Proc. of the ACM SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
11
-
-
24944520998
-
Authentication and integrity in outsourced database
-
San Diego, California, USA February
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced database. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, California, USA (February 2004).
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
12
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
April
-
R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2), 95-98 (April 1988).
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
13
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Hong Kong, China March
-
Y. Sun and K.J.R. Liu. Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, Hong Kong, China (March 2004).
-
(2004)
Proc. of the IEEE Infocom
-
-
Sun, Y.1
Liu, K.J.R.2
-
14
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
September
-
H. Tsai and C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computer and Security, 14(2), 159-166 (September 1995).
-
(1995)
Computer and Security
, vol.14
, Issue.2
, pp. 159-166
-
-
Tsai, H.1
Chang, C.2
-
15
-
-
0002360030
-
Secure group communications using key graphs
-
Vancouver, British Columbia September
-
C.K. Wong, M. Gouda, and S.S. Lam. Secure group communications using key graphs. In Proc. of the ACM SIGCOMM, Vancouver, British Columbia (September 1998).
-
(1998)
Proc. of the ACM SIGCOMM
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|