메뉴 건너뛰기




Volumn , Issue , 2008, Pages 287-298

Zerber: r-Confidential indexing for distributed documents

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; ENTERPRISE RESOURCE MANAGEMENT; SECURITY OF DATA; STATISTICAL METHODS; USER INTERFACES;

EID: 43349086436     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1353343.1353380     Document Type: Conference Paper
Times cited : (37)

References (32)
  • 4
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Bayardo, R. and Agrawal, R. Data privacy through optimal k-anonymization. In Proceedings of ICDE, 2005.
    • (2005) Proceedings of ICDE
    • Bayardo, R.1    Agrawal, R.2
  • 7
    • 19944380112 scopus 로고    scopus 로고
    • Bertino, E. and Sandhu, R. Database Security-Concepts, Approaches, and Challenges 2005, 2, Issue 1, 2-19.
    • Bertino, E. and Sandhu, R. Database Security-Concepts, Approaches, and Challenges 2005, Volume 2, Issue 1, 2-19.
  • 8
    • 21844467455 scopus 로고
    • A cryptographic file system for UNIX
    • Blaze, M. A cryptographic file system for UNIX. In Proceedings of the CCS, 1993.
    • (1993) Proceedings of the CCS
    • Blaze, M.1
  • 9
    • 38949164733 scopus 로고    scopus 로고
    • Chronos: An authenticated dictionary based on skip lists for timestamping systems
    • Blibech, K. and Gabillon, A. Chronos: an authenticated dictionary based on skip lists for timestamping systems. In Workshop on Secure Web Services, 2005.
    • (2005) Workshop on Secure Web Services
    • Blibech, K.1    Gabillon, A.2
  • 11
    • 77957863696 scopus 로고    scopus 로고
    • A Security Model for Full-Text File System Search in Multi-User Environments
    • San Francisco, California
    • Büttcher, S. and Clarke, C. L. A. A Security Model for Full-Text File System Search in Multi-User Environments; In Proceedings of the FAST, 2005, San Francisco, California.
    • (2005) Proceedings of the FAST
    • Büttcher, S.1    Clarke, C.L.A.2
  • 12
    • 34748812366 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive
    • Report 2004/051, Feb
    • Chang, Y.-C. and Mitzenmacher, M. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, Feb 2004. http://eprint.iacr.org/2004/051/
    • (2004)
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 13
    • 27844586850 scopus 로고    scopus 로고
    • A group key recovery mechanism based on logical key hierarchy
    • Sep
    • Cho, T., Lee, S. and Kim, W. 2004. A group key recovery mechanism based on logical key hierarchy. J. Comput. Secur. 12, 5 (Sep. 2004), 711-736.
    • (2004) J. Comput. Secur , vol.12 , Issue.5 , pp. 711-736
    • Cho, T.1    Lee, S.2    Kim, W.3
  • 14
    • 43349100278 scopus 로고    scopus 로고
    • Crescenzi, P. and Kann, V. A compendium of NP optimization problems. Available at: http://www.nada.kth.se/~viggo/problemlist/.
    • Crescenzi, P. and Kann, V. A compendium of NP optimization problems. Available at: http://www.nada.kth.se/~viggo/problemlist/.
  • 15
    • 0033075316 scopus 로고    scopus 로고
    • Combining fuzzy information from multiple systems
    • Fagin, R. Combining fuzzy information from multiple systems. Journal of Computer and System Sciences 1999, Volume 58, Number 1, 216-226.
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.1 , pp. 216-226
    • Fagin, R.1
  • 16
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Tokyo, Japan
    • Fung, B. C. M., Wang, K. and Yu, P. S. Top-down specialization for information and privacy preservation. In Proceedings of ICDE, 2005, Tokyo, Japan, 205-216.
    • (2005) Proceedings of ICDE , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 17
    • 43349101929 scopus 로고    scopus 로고
    • Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
    • Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
  • 18
    • 84964426510 scopus 로고    scopus 로고
    • Goodrich, M., Tamassia, R., and Schwerin, A. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DISCEX II, 2001.
    • Goodrich, M., Tamassia, R., and Schwerin, A. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DISCEX II, 2001.
  • 19
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Hacigumus, H., Iyer, B. R., Li, C. and Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of SIGMOD, 2002.
    • (2002) Proceedings of SIGMOD
    • Hacigumus, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 22
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar, V. Transforming data to satisfy privacy constraints. In Proceedings of SIGKDD, 2002.
    • (2002) Proceedings of SIGKDD
    • Iyengar, V.1
  • 27
    • 85009120801 scopus 로고    scopus 로고
    • Controlling Access to Published Data Using Cryptography
    • Miklau, G. and Suciu, D. Controlling Access to Published Data Using Cryptography. In Proceedings of VLDB 2003.
    • (2003) Proceedings of VLDB
    • Miklau, G.1    Suciu, D.2
  • 28
    • 85054431103 scopus 로고    scopus 로고
    • Trustworthy keyword search for regulatory-compliant records retention
    • Seoul, Korea
    • Mitra, S., Hsu, W. W. and Winslett, M. Trustworthy keyword search for regulatory-compliant records retention, In Proceedings of VLDB, 2006, Seoul, Korea, 1001-1012.
    • (2006) Proceedings of VLDB , pp. 1001-1012
    • Mitra, S.1    Hsu, W.W.2    Winslett, M.3
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. How to share a secret. Communications of the ACM, 1979 Volume 22 Issue 11, 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 0344756842 scopus 로고    scopus 로고
    • Modem Information Retrieval: A Brief Overview
    • Singhal, A. Modem Information Retrieval: A Brief Overview. In IEEE, Data Eng. Bull. 24(4), 2001
    • (2001) IEEE, Data Eng. Bull , vol.24 , Issue.4
    • Singhal, A.1
  • 31
    • 0033705124 scopus 로고    scopus 로고
    • Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
    • Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
  • 32
    • 43349106524 scopus 로고    scopus 로고
    • Available at
    • Stud IP LMS. Available at: http://www.studip.de/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.