메뉴 건너뛰기




Volumn 232, Issue , 2007, Pages 385-396

An experimental evaluation of multi-key strategies for data outsourcing

Author keywords

[No Author keywords available]

Indexed keywords

DATA ENCRYPTION; DATA OUTSOURCING; EXECUTE QUERY; EXPERIMENTAL EVALUATION; HOST SERVERS; OUTSOURCED DATUM; QUERY EXECUTION; UNAUTHORIZED ACCESS;

EID: 36248981396     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-72367-9_33     Document Type: Conference Paper
Times cited : (28)

References (15)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • August
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1 3), 239-248 (August 1983).
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 2
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Alexandria, VA, USA November
    • M.J. Atallah, K.B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. of the ACM CCS, Alexandria, VA, USA (November 2005).
    • (2005) Proc. of the ACM CCS
    • Atallah, M.J.1    Frikken, K.B.2    Blanton, M.3
  • 5
    • 33947109885 scopus 로고    scopus 로고
    • Chip-secured data access: Confidential data on untrusted servers
    • Hong Kong, China August
    • L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the 28th VLDB Conference, Hong Kong, China (August 2002).
    • (2002) Proc. of the 28th VLDB Conference
    • Bouganim, L.1    Pucheral, P.2
  • 8
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • September
    • E. Gudes. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, 6(5), 411-420 (September 1980).
    • (1980) IEEE Transactions on Software Engineering , vol.6 , Issue.5 , pp. 411-420
    • Gudes, E.1
  • 9
    • 0036204131 scopus 로고    scopus 로고
    • Providing database as a service
    • San Jose, CA, USA February
    • H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the ICDE, San Jose, CA, USA (February 2002).
    • (2002) Proc. of the ICDE
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3
  • 10
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin, USA June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD, Madison, Wisconsin, USA (June 2002).
    • (2002) Proc. of the ACM SIGMOD
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 12
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • April
    • R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2), 95-98 (April 1988).
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 13
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Hong Kong, China March
    • Y. Sun and K.J.R. Liu. Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, Hong Kong, China (March 2004).
    • (2004) Proc. of the IEEE Infocom
    • Sun, Y.1    Liu, K.J.R.2
  • 14
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • September
    • H. Tsai and C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computer and Security, 14(2), 159-166 (September 1995).
    • (1995) Computer and Security , vol.14 , Issue.2 , pp. 159-166
    • Tsai, H.1    Chang, C.2
  • 15
    • 0002360030 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Vancouver, British Columbia September
    • C.K. Wong, M. Gouda, and S.S. Lam. Secure group communications using key graphs. In Proc. of the ACM SIGCOMM, Vancouver, British Columbia (September 1998).
    • (1998) Proc. of the ACM SIGCOMM
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.