-
3
-
-
67650473559
-
Database security in high risk environments
-
Trinanes, J.A.: Database security in high risk environments. Technical report, governmentsecurity.org (2005), http://www.governmentsecurity.org/ articles/DatabaseSecurityinHighRiskEnvironments.php
-
(2005)
Technical Report, Governmentsecurity.org
-
-
Trinanes, J.A.1
-
4
-
-
0037077422
-
Standard for privacy of individually identi.able health information
-
HIPAA
-
HIPAA: Standard for privacy of individually identi.able health information. Federal Register 67(157),53181-53273 (2002)
-
(2002)
Federal Register
, vol.67
, Issue.157
, pp. 53181-53273
-
-
-
6
-
-
70349854398
-
-
Microsoft: Technical report Microsoft Corporation
-
Microsoft: Security features in microsoft sql server 2005. Technical report, Microsoft Corporation (2005), http://www.microsoft.com/sql/2005/ productinfo/
-
(2005)
Security Features in Microsoft Sql Server 2005
-
-
-
7
-
-
37849051972
-
-
IBM: Technical report, IBM Corporation
-
IBM: Ibm data encryption for ims and db2 databases. Technical report, IBM Corporation (2006), http://www-306.ibm.com/software/data/db2imstools/ db2tools/ibmencrypt.html
-
(2006)
Ibm Data Encryption for Ims and db2 Databases
-
-
-
8
-
-
70349874180
-
-
Seagate: October
-
Seagate: Drivetrust technology: A technical overview (October 2006), http://www.seagate.com/docs/pdf/whitepaper/TP564-DriveTrust-Oct06.pdf
-
(2006)
Drivetrust Technology: A Technical Overview
-
-
-
9
-
-
33244469997
-
Key management for multi-user encrypted databases
-
ACM, New York
-
Damiani, E., di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key management for multi-user encrypted databases. In: StorageSS 2005: Proceedings of the 2005 ACM workshop on Storage security and survivability, pp. 74-83. ACM, New York (2005)
-
(2005)
StorageSS 2005: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 74-83
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Paris, France June 13-18
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France (June 13-18, 2004)
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
11
-
-
67650687857
-
NIST: Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology
-
NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
Advanced Encryption Standard (Aes)
-
-
-
12
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515-556 (1989)
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
13
-
-
26444538232
-
A framework for effcient storage security in rdbms
-
Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., BÖhm, K., Ferrari, E. (eds.) EDBT 2004. Springer, Heidelberg
-
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for effcient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., BÖhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.2992, pp. 147-164. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2992
, pp. 147-164
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
14
-
-
84944324889
-
Weaving relations for cache performance.
-
Morgan Kaufmann Publishers Inc., San Francisco
-
Ailamaki, A., DeWitt, D.J., Hill, M.D., Skounakis, M.: Weaving relations for cache performance. In: Proceedings of the 27th International Conference on Very Large Data Bases, pp. 169-180. Morgan Kaufmann Publishers Inc., San Francisco (2001)
-
(2001)
Proceedings of the 27th International Conference on Very Large Data Bases
, pp. 169-180
-
-
Ailamaki, A.1
Dewitt, D.J.2
Hill, M.D.3
Skounakis, M.4
-
15
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, June 4-6
-
Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June 4-6, pp. 216-227 (2002), http://doi.acm.org/10.1145/564691. 564717
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
16
-
-
85065578926
-
A privacy-preserving index for range queries
-
Morgan Kaufmann Publishers Inc., San Francisco
-
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the 30th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., San Francisco (2004)
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
17
-
-
18744366643
-
Balancing con.dentiality and effciency in untrusted relational dbmss
-
ACM Press, New York
-
Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing con.dentiality and effciency in untrusted relational dbmss. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 93-102. ACM Press, New York (2003), http://doi.acm.org/10.1145/948109.948124
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: CIDR, pp. 186-199 (2005)
-
(2005)
CIDR
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
19
-
-
33750722191
-
A structure preserving database encryption scheme
-
Jonker,W., Petkovíc, M. (eds.) SDM 2004. Springer, Heidelberg
-
Elovici, Y., Shmueli, E., Waisenberg, R., Gudes, E.: A structure preserving database encryption scheme. In: Jonker,W., Petkovíc, M. (eds.) SDM 2004. LNCS, vol.3178, pp. 28-40. Springer, Heidelberg (2004), http://www.extra.research.philips.com/sdm-workshop/RonenSDM.pdf
-
(2004)
LNCS
, vol.3178
, pp. 28-40
-
-
Elovici, Y.1
Shmueli, E.2
Waisenberg, R.3
Gudes, E.4
-
20
-
-
0025387450
-
An effective approach to vertical partitioning for physical design of relational databases
-
Cornell, D.W., Yu, P.S.: An effective approach to vertical partitioning for physical design of relational databases. IEEE Trans. Softw. Eng. 16(2), 248-258 (1990)
-
(1990)
IEEE Trans. Softw. Eng.
, vol.16
, Issue.2
, pp. 248-258
-
-
Cornell, D.W.1
Yu, P.S.2
-
21
-
-
3142782213
-
Integrating vertical and horizontal partitioning into automated physical database design SIGMOD 2004
-
ACM, New York
-
Agrawal, S., Narasayya, V., Yang, B.: Integrating vertical and horizontal partitioning into automated physical database design. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 359-370. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 359-370
-
-
Agrawal, S.1
Narasayya, V.2
Yang, B.3
-
22
-
-
0021625744
-
Vertical partitioning algorithms for database design
-
Navathe, S., Ceri, S., Wiederhold, G., Dou, J.: Vertical partitioning algorithms for database design. ACM Trans. Database Syst. 9(4), 680-710 (1984)
-
(1984)
ACM Trans. Database Syst.
, vol.9
, Issue.4
, pp. 680-710
-
-
Navathe, S.1
Ceri, S.2
Wiederhold, G.3
Dou, J.4
-
25
-
-
4444250211
-
-
Cox, M., Engelschall, R., Henson, S., Laurie, B.: The OpenSSL Project, http://www.openssl.org/
-
The OpenSSL Project
-
-
Cox, M.1
Engelschall, R.2
Henson, S.3
Laurie, B.4
-
26
-
-
37849045956
-
Design and analysis of querying encrypted data in relational databases
-
Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. Springer, Heidelberg
-
Canim, M., Kantarcioglu, M.: Design and analysis of querying encrypted data in relational databases. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 177-194. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 177-194
-
-
Canim, M.1
Kantarcioglu, M.2
|