-
4
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
Vienna, Austria, September
-
S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. Over-encryption: management of access control evolution on outsourced data. In Proc. of the 33rd VLDB Conference, Vienna, Austria, September 2007.
-
(2007)
Proc. of the 33rd VLDB Conference
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi and P. Samarati . Preserving confidentiality of security policies in data outsourcing. In Proceedings of the 7th ACM workshop on Privacy in the electronic society, 75-84, 2008.
-
(2008)
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 75-84
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
6
-
-
33846573849
-
Selective data encryption in outsourced dynamic environments
-
E. Damiani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. Selective Data Encryption in Outsourced Dynamic Environments. Electronic Notes in Theoretical Computer Science, 2007.
-
(2007)
Electronic Notes in Theoretical Computer Science
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
74349119729
-
Metadata management in outsourced encrypted databases
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. Metadata Management in Outsourced encrypted databases. Lecture Notes in Computer Science, Secure Data Management, 2007.
-
(2007)
Lecture Notes in Computer Science, Secure Data Management
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
South Africa, May
-
E. Damiani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. An experimental evaluation of multi-key strategies for data outsourcing. In Proc. of the 22nd IFIP TC-11 International Information Security Conference, South Africa, May 2007.
-
(2007)
Proc. of the 22nd IFIP TC-11 International Information Security Conference
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
Fairfax, VA, November
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. A data outsourcing architecture combining cryptography and access control. In Proc. of the 1st Computer Security Architecture Workshop, Fairfax, VA, November 2007.
-
(2007)
Proc. of the 1st Computer Security Architecture Workshop
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
67650135696
-
Key-private proxy re-encryption
-
LNCS
-
G. Ateniese, K. Benson, and S.Hohenberger. Key-Private Proxy Re-encryption. Topics in Cryptology-CT-RSA, LNCS, vol.5473, 279-294, 2009.
-
(2009)
Topics in Cryptology-CT-RSA
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
12
-
-
52149099038
-
Tracing malicious proxies in proxy re-encryption
-
LNCS
-
B. Libert and D. Vergnaud. Tracing Malicious Proxies in Proxy Re-encryption. Pairing-Based Cryptography - Pairing, LNCS, vol.5209, pp.332-353, 2008.
-
(2008)
Pairing-based Cryptography- Pairing
, vol.5209
, pp. 332-353
-
-
Libert, B.1
Vergnaud, D.2
-
14
-
-
74349088188
-
Database encryption-how to balance security with performance
-
U. Mattsson. Database encryption-how to balance security with performance. Protegrity Corp, 2005.
-
(2005)
Protegrity Corp
-
-
Mattsson, U.1
|