-
1
-
-
37849012691
-
-
Jr, T.Z.: An ominous milestone: 100 million data leaks. New York Times (December 18,2006)
-
Jr, T.Z.: An ominous milestone: 100 million data leaks. New York Times (December 18,2006)
-
-
-
-
2
-
-
37849008752
-
-
Trinanes, J.A.: Database security in high risk environments.Technical report, governmentsecurity.org (2005) http://www.governmentsecurity.org/ articles/DatabaseSecurityinHighRiskEn%vironments.php.
-
Trinanes, J.A.: Database security in high risk environments.Technical report, governmentsecurity.org (2005) http://www.governmentsecurity.org/ articles/DatabaseSecurityinHighRiskEn%vironments.php.
-
-
-
-
3
-
-
0037077422
-
-
Standard for privacy of individually identifiable health information. Federal Register 67(157), 53181-53273 (2002)
-
Standard for privacy of individually identifiable health information. Federal Register 67(157), 53181-53273 (2002)
-
-
-
-
5
-
-
37849002581
-
Microsoft: Security features in microsoft sql server 2005
-
Technical report, Microsoft Corporation
-
Microsoft: Security features in microsoft sql server 2005. Technical report, Microsoft Corporation (2005), http://www.microsoft.com/sql/2005/ productinfo/
-
(2005)
-
-
-
6
-
-
37849051972
-
Ibm data encryption for ims and db2 databases
-
IBM:, Technical report, IBM Corporation
-
IBM: Ibm data encryption for ims and db2 databases. Technical report, IBM Corporation (2006), http://www-306.ibm.com/software/data/db2imstools/db2tools/ ibmencrypt.html
-
(2006)
-
-
-
7
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Paris, France, June 13-18, ACM Press, New York
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, ACM Press, New York (2004)
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
84976748588
-
On the encipherment of search trees and random access files
-
Bayer, R., Metzger, J.K.: On the encipherment of search trees and random access files. ACM Trans. Database Syst. 1(1), 37-52 (1976), http://doi.acm.org/ 10.1145/320434.320445
-
(1976)
ACM Trans. Database Syst
, vol.1
, Issue.1
, pp. 37-52
-
-
Bayer, R.1
Metzger, J.K.2
-
9
-
-
37849024898
-
Search key substitution in the encipherment of b-trees
-
McLeod, D, Sacks-Davis, R, Schek, H.J, eds, August 13-16, Morgan Kaufmann
-
Hardjono, T., Seberry, J.: Search key substitution in the encipherment of b-trees. In: McLeod, D., Sacks-Davis, R., Schek, H.J. (eds.) 16th International Conference on Very Large Data Bases, Brisbane, Queensland, Australia, Proceedings, August 13-16, 1990, pp. 50-58. Morgan Kaufmann (1990)
-
(1990)
16th International Conference on Very Large Data Bases, Brisbane, Queensland, Australia, Proceedings
, pp. 50-58
-
-
Hardjono, T.1
Seberry, J.2
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, June 4-6, ACM Press, New York
-
Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June 4-6, 2002, pp. 216-227. ACM Press, New York (2002), http://doi.acm.org/10.1145/564691.564717
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
11
-
-
85065578926
-
A privacy-preserving index for range queries
-
Morgan Kaufmann Publishers Inc, San Francisco
-
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the 30th International Conference on Very Large Data Bases, Morgan Kaufmann Publishers Inc., San Francisco (2004)
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
12
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
ACM Press,New York
-
Damiani, E., Vimercati, S.D.C., jodia, S.J., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 93-102. ACM Press,New York (2003), http://doi.acm.org/10.1145/948109.948124
-
(2003)
Proceedings of the 10th ACM conference on Computer and communications security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
jodia, S.J.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
26444538232
-
-
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, 2992, Springer, Heidelberg (2004)
-
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, Springer, Heidelberg (2004)
-
-
-
-
14
-
-
33750722191
-
-
Elovici, Y., Shmueli, E., nberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, 3178, Springer, Heidelberg (2004), http://www.extra.research. philips.com/sdm-workshop/RonenSDM.pdf
-
Elovici, Y., Shmueli, E., nberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, Springer, Heidelberg (2004), http://www.extra.research. philips.com/sdm-workshop/RonenSDM.pdf
-
-
-
-
15
-
-
37849034915
-
-
NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
-
-
-
16
-
-
37849016899
-
-
Recommendation for block cipher modes of operation methods and techniques. Technical Report NIST Special Publication 800-38A, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/ nistpubs/800-38a/sp800-38a.pdf
-
Recommendation for block cipher modes of operation methods and techniques. Technical Report NIST Special Publication 800-38A, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/ nistpubs/800-38a/sp800-38a.pdf
-
-
-
-
17
-
-
37849006448
-
-
Data encryption standard (des). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology (1988)
-
Data encryption standard (des). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology (1988)
-
-
-
-
18
-
-
0342645557
-
The blowfish encryption algorithm
-
April
-
Schneier, B.: The blowfish encryption algorithm. Dr. Dobb's Journal, 38-40 (April 1994)
-
(1994)
Dr. Dobb's Journal
, vol.38-40
-
-
Schneier, B.1
-
19
-
-
84855630085
-
Ctr-mode encryption
-
Lipmaa, H., Rogaway, P., Wagner, D.: Ctr-mode encryption. In: NIST, Computer Security Resource Center, First Modes of Operation Workshop (2000), http://csrc.nist.gov/CryptoToolkit/modes/workshop1/papers/lipmaa-ctr.pdf
-
(2000)
NIST, Computer Security Resource Center, First Modes of Operation Workshop
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
20
-
-
4444250211
-
-
Cox, M., Engelschall, R., Henson, S., Laurie, B.: The OpenSSL Project, http://www.openssl.org/
-
The OpenSSL Project
-
-
Cox, M.1
Engelschall, R.2
Henson, S.3
Laurie, B.4
-
21
-
-
37849030739
-
-
IBM
-
IBM: Table Space Design, http://publib.boulder.ibm.com/infocenter/db21uw/ v9/index.jsp?topic=/com%.ibm.db2.udb.admin.doc/doc/c0004935.htm
-
Table Space Design
-
-
-
22
-
-
0042997230
-
Idea: A cipher for muldimedia architectures?
-
Tavares, S, Meijer, H, eds, Springer-Verlag, Heidelberg
-
Lipmaa, H.: Idea: A cipher for muldimedia architectures? In: Tavares, S., Meijer, H. (eds.) Selected Areas in Cryptography '98, Springer-Verlag, Heidelberg (1998)
-
(1998)
Selected Areas in Cryptography '98
-
-
Lipmaa, H.1
-
23
-
-
84944324889
-
Weaving relations for cache performance
-
Morgan Kaufmann Publishers Inc.,San Francisco
-
Ailamaki, A., DeWitt, D.J., Hill, M.D., Skounakis, M.: Weaving relations for cache performance. In: Proceedings of the 27th International Conference on Very Large Data Bases, pp. 169-180. Morgan Kaufmann Publishers Inc.,San Francisco (2001)
-
(2001)
Proceedings of the 27th International Conference on Very Large Data Bases
, pp. 169-180
-
-
Ailamaki, A.1
DeWitt, D.J.2
Hill, M.D.3
Skounakis, M.4
-
24
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|