메뉴 건너뛰기




Volumn , Issue , 2007, Pages 725-733

Enhancing secured service interoperability with decentralized orchestration

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC; MARKUP LANGUAGES; SPECIFICATION LANGUAGES; TECHNOLOGY;

EID: 48349120253     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2007.4401060     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 2
    • 84974667699 scopus 로고    scopus 로고
    • Explicit representation of constrained schema mappings for mediated data integration
    • S. Bhalla, editor, Databases in Networked Information Systems, Proceedings, of, Springer
    • C. Altenschmidt and J. Biskup. Explicit representation of constrained schema mappings for mediated data integration. In S. Bhalla, editor, Databases in Networked Information Systems, Proceedings, volume 2544 of Lecture Notes in Computer Science, pages 103-132. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2544 , pp. 103-132
    • Altenschmidt, C.1    Biskup, J.2
  • 4
    • 26444433217 scopus 로고    scopus 로고
    • Secure mediation with mobile code
    • S. Jajodia and D. Wijesekera, editors, Data and Applications Security XIX, Proceedings, of, Springer
    • J. Biskup, B. Sprick, and L. Wiese. Secure mediation with mobile code. In S. Jajodia and D. Wijesekera, editors, Data and Applications Security XIX, Proceedings, volume 3654 of Lecture Notes in Computer Science, pages 267-280. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3654 , pp. 267-280
    • Biskup, J.1    Sprick, B.2    Wiese, L.3
  • 7
    • 33745801618 scopus 로고    scopus 로고
    • Securing XML data in third-party distribution systems
    • O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, and W. Teiken, editors, ACM
    • B. Carminati, E. Ferrari, and E. Bertino. Securing XML data in third-party distribution systems. In O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, and W. Teiken, editors, Conference on Information and Knowledge Management, Proceedings, pages 99-106. ACM. 2005.
    • (2005) Conference on Information and Knowledge Management, Proceedings , pp. 99-106
    • Carminati, B.1    Ferrari, E.2    Bertino, E.3
  • 9
    • 84991010622 scopus 로고    scopus 로고
    • Anti-tamper databases: Processing aggregate queries over encrypted databases
    • R. S. Barga and X. Zhou, editors, IEEE Computer Society
    • S. S. Chung and G. Özsoyoglu. Anti-tamper databases: Processing aggregate queries over encrypted databases. In R. S. Barga and X. Zhou, editors, International Conference on Data Engineering - Workshops, Proceedings, page 98. IEEE Computer Society, 2006.
    • (2006) International Conference on Data Engineering - Workshops, Proceedings , pp. 98
    • Chung, S.S.1    Özsoyoglu, G.2
  • 10
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • W. Fumy, editor, EUROCRYPT. Proceedings. of, Springer
    • R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In W. Fumy, editor, EUROCRYPT. Proceedings. volume 1233 of Lecture Notes in Computer Science, pages 103-118. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 12
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • C. Cachin and J. Camenisch. editors, Advances in Cryptology, EUROCRYPT, Proceedings, of, Springer
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch. editors, Advances in Cryptology - EUROCRYPT, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 1-19. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 14
    • 33745623486 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • Y.-J. Lee, J. Li. K.-Y. Whang, and D. Lee, editors, Database Systems for Advances Applications, Proceedings, of, Springer
    • H. Hacigümüş, B. R. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Y.-J. Lee, J. Li. K.-Y. Whang, and D. Lee, editors, Database Systems for Advances Applications, Proceedings, volume 2973 of Lecture Notes in Computer Science, pages 125-136. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2973 , pp. 125-136
    • Hacigümüş, H.1    Iyer, B.R.2    Mehrotra, S.3
  • 15
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, Morgan Kaufmann
    • B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, International Conference on Very Large Data Bases, Proceedings, pages 720-731. Morgan Kaufmann, 2004.
    • (2004) International Conference on Very Large Data Bases, Proceedings , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 16
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • V. Shoup, editor, Advances in Cryptology, CRYPTO, Proceedings, of, Springer
    • L. Kissner and D. X. Song. Privacy-preserving set operations. In V. Shoup, editor, Advances in Cryptology - CRYPTO, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 241-257. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 17
    • 84943254537 scopus 로고    scopus 로고
    • Chaos: An active security mediation system
    • B. Wangler and L. Bergman, editors. Conference on Advanced Information Systems Engineering. Proceedings, of, Springer
    • D. Liu, K. H. Law, and G. Wiederhold. Chaos: An active security mediation system. In B. Wangler and L. Bergman, editors. Conference on Advanced Information Systems Engineering. Proceedings, volume 1789 of Lecture Notes in Computer Science, pages 232-246. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1789 , pp. 232-246
    • Liu, D.1    Law, K.H.2    Wiederhold, G.3
  • 18
    • 33746748166 scopus 로고    scopus 로고
    • Aggregation queries in the database-as-a-service model
    • E. Damiani and P. Liu, editors, Data and Applications Security XX, Proceedings, of, Springer
    • E. Mykletun and G. Tsudik. Aggregation queries in the database-as-a-service model. In E. Damiani and P. Liu, editors, Data and Applications Security XX, Proceedings, volume 4127 of Lecture Notes in Computer Science, pages 89-103. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4127 , pp. 89-103
    • Mykletun, E.1    Tsudik, G.2
  • 19
    • 84866261796 scopus 로고    scopus 로고
    • Anti-tamper databases: Querying encrypted databases
    • S. D. C. di Vimercati, I. Ray, and I. Ray, editors, Kluwer
    • G. Özsoyoglu, D. A. Singer, and S. S. Chung. Anti-tamper databases: Querying encrypted databases. In S. D. C. di Vimercati, I. Ray, and I. Ray, editors, Data und Applications Security XVII, Proceedings, pages 133-146. Kluwer, 2003.
    • (2003) Data und Applications Security XVII, Proceedings , pp. 133-146
    • Özsoyoglu, G.1    Singer, D.A.2    Chung, S.S.3
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • J. Stern, editor, Advances in Cryptology, EUROCRYPT, Proceedings, of, Springer
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT, Proceedings, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 21
    • 34548743248 scopus 로고    scopus 로고
    • PhD dissertation, University of Dortmund. Department of Mathematics, Aug, Cryptology ePrint Archive, Report 2006/001
    • D. K. Rappe. Homomorphic Cryptosystems and their Applications. PhD dissertation, University of Dortmund. Department of Mathematics, Aug. 2004. Cryptology ePrint Archive, Report 2006/001. http://eprint.iacr.org/2006/001.
    • (2004) Homomorphic Cryptosystems and their Applications
    • Rappe, D.K.1
  • 22
    • 33746686328 scopus 로고    scopus 로고
    • Information theoretical analysis of two-party secret computation
    • E. Damiani and P. Liu, editors. Data and Applications Security XX, Proceedings, of, Springer
    • D.-W. Wang, C.-J. Liau, Y.-T. Chiang, and T.-S. Hsu. Information theoretical analysis of two-party secret computation. In E. Damiani and P. Liu, editors. Data and Applications Security XX, Proceedings, volume 4127 of Lecture Notes in Computer Science, pages 310-317. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4127 , pp. 310-317
    • Wang, D.-W.1    Liau, C.-J.2    Chiang, Y.-T.3    Hsu, T.-S.4
  • 24
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-preserving queries on encrypted data
    • D. Gollmann, J. Meier, and A. Sabelfeld, editors, European Symposium on Research in Computer Security, Proceedings, of, Springer
    • Z. Yang, S. Zhong, and R. N. Wrighf. Privacy-preserving queries on encrypted data. In D. Gollmann, J. Meier, and A. Sabelfeld, editors, European Symposium on Research in Computer Security, Proceedings, volume 4189 of Lecture Notes in Computer Science, pages 479-495. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4189 , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wrighf, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.