-
1
-
-
1142303699
-
Information sharing across private databases
-
A. Y. Halevy, Z. G. Ives, and A. Doan, editors, ACM
-
R. Agrawal, A. V. Evfimievski, and R. Srikant. Information sharing across private databases. In A. Y. Halevy, Z. G. Ives, and A. Doan, editors, ACM SIGMOD International Conference on Management of Data, Proceedings, pages 86-97. ACM, 2003.
-
(2003)
ACM SIGMOD International Conference on Management of Data, Proceedings
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.V.2
Srikant, R.3
-
2
-
-
84974667699
-
Explicit representation of constrained schema mappings for mediated data integration
-
S. Bhalla, editor, Databases in Networked Information Systems, Proceedings, of, Springer
-
C. Altenschmidt and J. Biskup. Explicit representation of constrained schema mappings for mediated data integration. In S. Bhalla, editor, Databases in Networked Information Systems, Proceedings, volume 2544 of Lecture Notes in Computer Science, pages 103-132. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2544
, pp. 103-132
-
-
Altenschmidt, C.1
Biskup, J.2
-
3
-
-
0038613719
-
Secure mediation: Requirements, design, and architecture
-
June
-
C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut, Secure mediation: Requirements, design, and architecture. Journal of Computer Security, 11(3):365-398, June 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 365-398
-
-
Altenschmidt, C.1
Biskup, J.2
Flegel, U.3
Karabulut, Y.4
-
4
-
-
26444433217
-
Secure mediation with mobile code
-
S. Jajodia and D. Wijesekera, editors, Data and Applications Security XIX, Proceedings, of, Springer
-
J. Biskup, B. Sprick, and L. Wiese. Secure mediation with mobile code. In S. Jajodia and D. Wijesekera, editors, Data and Applications Security XIX, Proceedings, volume 3654 of Lecture Notes in Computer Science, pages 267-280. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3654
, pp. 267-280
-
-
Biskup, J.1
Sprick, B.2
Wiese, L.3
-
5
-
-
0029760798
-
Secure mediated databases
-
S. Y. W. Su, editor, IEEE Computer Society
-
K. S. Candan, S. Jajodia, and V. S. Subrahmanian. Secure mediated databases. In S. Y. W. Su, editor, 12th International Conference on Data Engineering, Proceedings. pages 28-37. IEEE Computer Society, 1996.
-
(1996)
12th International Conference on Data Engineering, Proceedings
, pp. 28-37
-
-
Candan, K.S.1
Jajodia, S.2
Subrahmanian, V.S.3
-
6
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In Symposium on the Theory of Computing, Proceedings, pages 639-648. ACM, 1996.
-
(1996)
Symposium on the Theory of Computing, Proceedings
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
7
-
-
33745801618
-
Securing XML data in third-party distribution systems
-
O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, and W. Teiken, editors, ACM
-
B. Carminati, E. Ferrari, and E. Bertino. Securing XML data in third-party distribution systems. In O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, and W. Teiken, editors, Conference on Information and Knowledge Management, Proceedings, pages 99-106. ACM. 2005.
-
(2005)
Conference on Information and Knowledge Management, Proceedings
, pp. 99-106
-
-
Carminati, B.1
Ferrari, E.2
Bertino, E.3
-
8
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
A. Ceselli, E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security, 8(1): 119-152, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
di Vimercati, S.D.C.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
84991010622
-
Anti-tamper databases: Processing aggregate queries over encrypted databases
-
R. S. Barga and X. Zhou, editors, IEEE Computer Society
-
S. S. Chung and G. Özsoyoglu. Anti-tamper databases: Processing aggregate queries over encrypted databases. In R. S. Barga and X. Zhou, editors, International Conference on Data Engineering - Workshops, Proceedings, page 98. IEEE Computer Society, 2006.
-
(2006)
International Conference on Data Engineering - Workshops, Proceedings
, pp. 98
-
-
Chung, S.S.1
Özsoyoglu, G.2
-
10
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
W. Fumy, editor, EUROCRYPT. Proceedings. of, Springer
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In W. Fumy, editor, EUROCRYPT. Proceedings. volume 1233 of Lecture Notes in Computer Science, pages 103-118. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
11
-
-
0019573099
-
A database encryption system with subkeys
-
G.I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2):312-328, 1981.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
12
-
-
35048820609
-
Efficient private matching and set intersection
-
C. Cachin and J. Camenisch. editors, Advances in Cryptology, EUROCRYPT, Proceedings, of, Springer
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch. editors, Advances in Cryptology - EUROCRYPT, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 1-19. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
M. J. Franklin, B. Moon, and A. Ailamaki. editors, ACM
-
H. Hacigümüş, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In M. J. Franklin, B. Moon, and A. Ailamaki. editors, ACM SIGMOD International Conference on Management of Data, Proceedings, pages 216-227. ACM. 2002.
-
(2002)
ACM SIGMOD International Conference on Management of Data, Proceedings
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
14
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
Y.-J. Lee, J. Li. K.-Y. Whang, and D. Lee, editors, Database Systems for Advances Applications, Proceedings, of, Springer
-
H. Hacigümüş, B. R. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Y.-J. Lee, J. Li. K.-Y. Whang, and D. Lee, editors, Database Systems for Advances Applications, Proceedings, volume 2973 of Lecture Notes in Computer Science, pages 125-136. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2973
, pp. 125-136
-
-
Hacigümüş, H.1
Iyer, B.R.2
Mehrotra, S.3
-
15
-
-
85065578926
-
A privacy-preserving index for range queries
-
M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, Morgan Kaufmann
-
B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, International Conference on Very Large Data Bases, Proceedings, pages 720-731. Morgan Kaufmann, 2004.
-
(2004)
International Conference on Very Large Data Bases, Proceedings
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
16
-
-
33745160750
-
Privacy-preserving set operations
-
V. Shoup, editor, Advances in Cryptology, CRYPTO, Proceedings, of, Springer
-
L. Kissner and D. X. Song. Privacy-preserving set operations. In V. Shoup, editor, Advances in Cryptology - CRYPTO, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 241-257. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
17
-
-
84943254537
-
Chaos: An active security mediation system
-
B. Wangler and L. Bergman, editors. Conference on Advanced Information Systems Engineering. Proceedings, of, Springer
-
D. Liu, K. H. Law, and G. Wiederhold. Chaos: An active security mediation system. In B. Wangler and L. Bergman, editors. Conference on Advanced Information Systems Engineering. Proceedings, volume 1789 of Lecture Notes in Computer Science, pages 232-246. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1789
, pp. 232-246
-
-
Liu, D.1
Law, K.H.2
Wiederhold, G.3
-
18
-
-
33746748166
-
Aggregation queries in the database-as-a-service model
-
E. Damiani and P. Liu, editors, Data and Applications Security XX, Proceedings, of, Springer
-
E. Mykletun and G. Tsudik. Aggregation queries in the database-as-a-service model. In E. Damiani and P. Liu, editors, Data and Applications Security XX, Proceedings, volume 4127 of Lecture Notes in Computer Science, pages 89-103. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4127
, pp. 89-103
-
-
Mykletun, E.1
Tsudik, G.2
-
19
-
-
84866261796
-
Anti-tamper databases: Querying encrypted databases
-
S. D. C. di Vimercati, I. Ray, and I. Ray, editors, Kluwer
-
G. Özsoyoglu, D. A. Singer, and S. S. Chung. Anti-tamper databases: Querying encrypted databases. In S. D. C. di Vimercati, I. Ray, and I. Ray, editors, Data und Applications Security XVII, Proceedings, pages 133-146. Kluwer, 2003.
-
(2003)
Data und Applications Security XVII, Proceedings
, pp. 133-146
-
-
Özsoyoglu, G.1
Singer, D.A.2
Chung, S.S.3
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, editor, Advances in Cryptology, EUROCRYPT, Proceedings, of, Springer
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT, Proceedings, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
34548743248
-
-
PhD dissertation, University of Dortmund. Department of Mathematics, Aug, Cryptology ePrint Archive, Report 2006/001
-
D. K. Rappe. Homomorphic Cryptosystems and their Applications. PhD dissertation, University of Dortmund. Department of Mathematics, Aug. 2004. Cryptology ePrint Archive, Report 2006/001. http://eprint.iacr.org/2006/001.
-
(2004)
Homomorphic Cryptosystems and their Applications
-
-
Rappe, D.K.1
-
22
-
-
33746686328
-
Information theoretical analysis of two-party secret computation
-
E. Damiani and P. Liu, editors. Data and Applications Security XX, Proceedings, of, Springer
-
D.-W. Wang, C.-J. Liau, Y.-T. Chiang, and T.-S. Hsu. Information theoretical analysis of two-party secret computation. In E. Damiani and P. Liu, editors. Data and Applications Security XX, Proceedings, volume 4127 of Lecture Notes in Computer Science, pages 310-317. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4127
, pp. 310-317
-
-
Wang, D.-W.1
Liau, C.-J.2
Chiang, Y.-T.3
Hsu, T.-S.4
-
24
-
-
33750247597
-
Privacy-preserving queries on encrypted data
-
D. Gollmann, J. Meier, and A. Sabelfeld, editors, European Symposium on Research in Computer Security, Proceedings, of, Springer
-
Z. Yang, S. Zhong, and R. N. Wrighf. Privacy-preserving queries on encrypted data. In D. Gollmann, J. Meier, and A. Sabelfeld, editors, European Symposium on Research in Computer Security, Proceedings, volume 4189 of Lecture Notes in Computer Science, pages 479-495. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4189
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wrighf, R.N.3
|