-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, June
-
R. Agrawal, J. Kierman, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. of ACM SIGMOD 2004, Paris, France, June 2004.
-
(2004)
Proc. of ACM SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
August
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS, 1(3):239-248, August 1983.
-
(1983)
ACM TOCS
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
4
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Alexandria, VA, USA, November
-
M. Atallah, K. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. of the 12th ACM CCS05, Alexandria, VA, USA, November 2005.
-
(2005)
Proc. of the 12th ACM CCS05
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
5
-
-
85129109910
-
Chip-secured data access: Reconciling access rights with data encryption
-
Berlin, Germany, September
-
L. Bouganim, F. D. Ngoc, P. Pucheral, and L. Wu. Chip-secured data access: Reconciling access rights with data encryption. In Proc. of the 29th VLDB Conference, Berlin, Germany, September 2003.
-
(2003)
Proc. of the 29th VLDB Conference
-
-
Bouganim, L.1
Ngoc, F.D.2
Pucheral, P.3
Wu, L.4
-
6
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
DOI 10.1145/1053283.1053289
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM TISSec, 8(1):119-152, February 2005. (Pubitemid 40479431)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Dresden, Germany, September
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Fragmentation and encryption to enforce privacy in data storage. In Proc. of the 12th ESORICS, Dresden, Germany, September 2007.
-
(2007)
Proc. of the 12th ESORICS
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
33947630349
-
On key assignment for hierarchical access control
-
Venice, Italy, July
-
J. Crampton, K. Martin, and P. Wild. On key assignment for hierarchical access control. In Proc. of the 19th IEEE CSFW'06, Venice, Italy, July 2006.
-
(2006)
Proc. of the 19th IEEE CSFW'06
-
-
Crampton, J.1
Martin, K.2
Wild, P.3
-
9
-
-
33244469997
-
Key management for multiuser encrypted databases
-
Fairfax, Virginia, USA, November
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multiuser encrypted databases. In Proc. of the International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, November 2005.
-
(2005)
Proc. of the International Workshop on Storage Security and Survivability
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
South Africa, May
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. An experimental evaluation of multi-key strategies for data outsourcing. In Proc. of the 22nd IFIP TC-11 International Information Security Conference, South Africa, May 2007.
-
(2007)
Proc. of the 22nd IFIP TC-11 International Information Security Conference
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
Vienna, Austria, September
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of access control evolution on outsourced data. In Proc. of the 33rd VLDB Conference, Vienna, Austria, September 2007.
-
(2007)
Proc. of the 33rd VLDB Conference
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
0036204131
-
Providing database as a service
-
San Jose, CA, USA, February
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th ICDE, San Jose, CA, USA, February 2002.
-
(2002)
Proc. of 18th ICDE
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
13
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Jeju Island, Korea, March
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Proc. of the 9th International Conference on Database Systems for Advanced Applications, Jeju Island, Korea, March 2004.
-
(2004)
Proc. of the 9th International Conference on Database Systems for Advanced Applications
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
14
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD 2002, Madison, Wisconsin, USA, June 2002.
-
(2002)
Proc. of the ACM SIGMOD 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
15
-
-
0242625197
-
Cryptographic access control in a distributed file system
-
Como, Italy, June
-
A. Harrington and C. Jensen. Cryptographic access control in a distributed file system. In Proc. of the 8th SACMAT, Como, Italy, June 2003.
-
(2003)
Proc. of the 8th SACMAT
-
-
Harrington, A.1
Jensen, C.2
-
17
-
-
85128992094
-
Controlling access to published data using cryptography
-
Berlin, Germany, September
-
G. Miklau and D. Suciu. Controlling access to published data using cryptography. In Proc. of the 29th VLDB Conference, Berlin, Germany, September 2003.
-
(2003)
Proc. of the 29th VLDB Conference
-
-
Miklau, G.1
Suciu, D.2
-
19
-
-
19944423977
-
The protection of information in computer systems
-
July
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.1
Schroeder, M.2
|