-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J.M., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Lee, J.M.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
0041783510
-
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (May 2000)
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (May 2000)
-
-
-
-
3
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
Bertino, E., Ooi, B.C., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: Proceedings of the 21st International Conference on Data Engineering (ICDE), pp. 521-532 (2005)
-
(2005)
Proceedings of the 21st International Conference on Data Engineering (ICDE)
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
5
-
-
84943527796
-
-
Chumash, T., Yao, D.: Detection and prevention of insider threats in database driven web services. In: Proceedings of The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM) (June 2009)
-
Chumash, T., Yao, D.: Detection and prevention of insider threats in database driven web services. In: Proceedings of The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM) (June 2009)
-
-
-
-
6
-
-
37849013914
-
Privacy-preserving schema matching using mutual information
-
Barker, S, Ahn, G.-J, eds, Data and Applications Security 2007, Springer, Heidelberg
-
Cruz, I.F., Tamassia, R., Yao, D.: Privacy-preserving schema matching using mutual information. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 93-94. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 93-94
-
-
Cruz, I.F.1
Tamassia, R.2
Yao, D.3
-
7
-
-
0038274733
-
Authentic third-party data publication
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. Journal of Computer Security 11(3) (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
8
-
-
1142275486
-
Revealing information while preserving privacy
-
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS, pp. 202-210 (2003)
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
9
-
-
84949438251
-
Inference Control in Statistical Databases
-
Domingo-Ferrer, J, ed, Springer, Heidelberg
-
Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. LNCS, vol. 2316. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2316
-
-
-
10
-
-
70349305273
-
-
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, 4978, pp. 1-19. Springer, Heidelberg (2008)
-
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
33745556605
-
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 265-284. Springer, Heidelberg (2006)
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
69949120750
-
-
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. CoRR, abs/0803.0032 (2008)
-
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. CoRR, abs/0803.0032 (2008)
-
-
-
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service provider model
-
ACM Press, New York
-
Hacigümüs, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service provider model. In: Proceedings of ACM SIGMOD Conference on Management of Data, pp. 216-227. ACM Press, New York (2002)
-
(2002)
Proceedings of ACM SIGMOD Conference on Management of Data
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
16
-
-
24144493423
-
-
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 264-282. Springer, Heidelberg (2005)
-
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
49549109805
-
Private inference control for aggregate database queries. In: ICDM Workshops
-
Los Alamitos
-
Jagannathan, G., Wright, R.N.: Private inference control for aggregate database queries. In: ICDM Workshops, pp. 711-716. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Computer Society
, pp. 711-716
-
-
Jagannathan, G.1
Wright, R.N.2
-
18
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chaudhuri, S, Hristidis, V, Polyzotis, N, eds, ACM, New York
-
Li, F., Hadjielef theriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Chaudhuri, S., Hristidis, V., Polyzotis, N. (eds.) SIGMOD Conference, pp. 121-132. ACM, New York (2006)
-
(2006)
SIGMOD Conference
, pp. 121-132
-
-
Li, F.1
Hadjielef theriou, M.2
Kollios, G.3
Reyzin, L.4
-
19
-
-
84867540301
-
-
Massell, P., Zayatz, L., Funk, J.: Protecting the confidentiality of survey tabular data by adding noise to the underlying microdata: Application to the commodity flow survey. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, 4302, pp. 304-317. Springer, Heidelberg (2006)
-
Massell, P., Zayatz, L., Funk, J.: Protecting the confidentiality of survey tabular data by adding noise to the underlying microdata: Application to the commodity flow survey. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol. 4302, pp. 304-317. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
84920380941
-
Protocols for public key cryptosystems
-
IEEE Computer Society Press, Los Alamitos
-
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122-133. IEEE Computer Society Press, Los Alamitos (1980)
-
(1980)
Proceedings of the 1980 Symposium on Security and Privacy
, pp. 122-133
-
-
Merkle, R.1
-
21
-
-
69949189852
-
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (February 2004)
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (February 2004)
-
-
-
-
22
-
-
69949142272
-
-
Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) (July 2006)
-
Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) (July 2006)
-
-
-
-
23
-
-
69949188211
-
-
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: International Conference on Database Systems for Advanced Applications (DASFAA) (April 2006)
-
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: International Conference on Database Systems for Advanced Applications (DASFAA) (April 2006)
-
-
-
-
24
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 407-418 (2005)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
25
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
26
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
35448932873
-
Privacy preserving schema and data matching
-
Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 653-664 (2007)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
29
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
0036811662
-
k-Anonymity, a model for protecting privacy
-
Sweeney, L.: k-Anonymity, a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557-570 (2002)
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
31
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS 2004) (2004)
-
(2004)
Proceedings of Symposium on Network and Distributed Systems Security (NDSS
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
33
-
-
56349121668
-
Private information: To reveal or not to reveal
-
Yao, D., Frikken, K.B., Atallah, M.J., Tamassia, R.: Private information: To reveal or not to reveal. ACM Trans. Inf. Syst. Secur. 12(1) (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.1
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
Tamassia, R.4
|