-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
VLDB Endowment
-
AGGARWAL, G., BAWA, M., GANESAN, P., GARCIA-MOLINA, H., KENTHAPADI, K., MOTWANI, R., SRIVASTAVA, U., THOMAS, D., AND XU, Y. 2005. Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Conference on Innovative Data Systems Research (CIDR'05). VLDB Endowment, 186-199.
-
(2005)
Proceedings of the Conference on Innovative Data Systems Research (CIDR'05)
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM, New York
-
AGRAWAL, R., KIERMAN, J., SRIKANT, R., AND XU, Y. 2004. Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD'04 International Conference on Management of Data. ACM, New York, 563-574.
-
(2004)
Proceedings of the ACM SIGMOD'04 International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
AKL, S. AND TAYLOR, P. 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1, 3, 239-248.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
4
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
ACM, New York
-
ATALLAH, M., FRIKKEN, K., AND BLANTON, M. 2005. Dynamic and efficient key management for access hierarchies. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'05). ACM, New York, 190-202.
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS'05)
, pp. 190-202
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
5
-
-
34547282859
-
Provably-Secure time-bound hierarchical key assignment schemes
-
ACM, New York
-
ATENIESE, G., DE SANTIS, A., FERRARA, A. L., AND MASUCCI, B. 2006. Provably-Secure time-bound hierarchical key assignment schemes. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'06). ACM, New York, 288-297.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security (CCS'06)
, pp. 288-297
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
6
-
-
84994079447
-
Materialized views selection in a multidimensional database
-
Morgan Kaufmann, San Francisco, CA
-
BARALIS, E., PARABOSCHI, S., AND TENIENTE, E. 1997. Materialized views selection in a multidimensional database. In Proceedings of the International Conference on Very Large Databases (VLDB'97). Morgan Kaufmann, San Francisco, CA,156-165.
-
(1997)
Proceedings of the International Conference on Very Large Databases (VLDB'97)
, pp. 156-165
-
-
Baralis, E.1
Paraboschi, S.2
Teniente, E.3
-
8
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
CESELLI, A., DAMIANI, E., DE CAPITANI DI VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2005. Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inform. Syst. Secur. 8, 1, 119-152.
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
0032201622
-
Private information retrieval
-
CHOR, B., KUSHILEVITZ, E., GOLDREICH, O., AND SUDAN, M. 1998. Private information retrieval. J. ACM 45, 6, 965-981.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Springer
-
CIRIANI, V., DE CAPITANI DI VIMERCATI, S., FORESTI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2007. Fragmentation and encryption to enforce privacy in data storage. In Proceedings of the European Symposium on Research in Computer Security (ESORICS'07). Springer, 225-239.
-
(2007)
Proceedings of the European Symposium on Research in Computer Security (ESORICS'07)
, pp. 225-239
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
72749109110
-
Anonymizing bipartite graph data using safe groupings
-
VLDB Endowment
-
CORMODE, G., SRIVASTAVA, D., YU, T., AND ZHANG, Q. 2008. Anonymizing bipartite graph data using safe groupings. In Proceedings of the International Conference on Very Large Databases (VLDB'08). VLDB Endowment, 833-844.
-
(2008)
Proceedings of the International Conference on Very Large Databases (VLDB'08)
, pp. 833-844
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
12
-
-
33947630349
-
On key assignment for hierarchical access control
-
IEEE Computer Society, Washington
-
CRAMPTON, J.,MARTIN, K., ANDWILD, P. 2006. On key assignment for hierarchical access control. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'06). IEEE Computer Society, Washington, 98-111.
-
(2006)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 98-111
-
-
Crampton, J.1
Martin, K.2
Andwild, P.3
-
13
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
Springer
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., FORESTI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2007. An experimental evaluation of multi-key strategies for data outsourcing. In Proceedings of the IFIP International Conference on Information Security (SEC'07). Springer, 385-396.
-
(2007)
Proceedings of the IFIP International Conference on Information Security (SEC'07)
, pp. 385-396
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
14
-
-
0010314426
-
-
THE DBLP COMPUTER SCIENCE BIBLIOGRAPHY
-
THE DBLP COMPUTER SCIENCE BIBLIOGRAPHY. The DBLP computer science bibliography. http://dblp.uni-trier.de.
-
The DBLP Computer Science Bibliography
-
-
-
15
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
ACM, New York
-
DE CAPITANI DI VIMERCATI, S., FORESTI, S., JAJODIA, S., PARABOSCHI, S., PELOSI, G., AND SAMARATI, P. 2008. Preserving confidentiality of security policies in data outsourcing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES'08). ACM, New York, 75-84.
-
(2008)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES'08)
, pp. 75-84
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
16
-
-
85011043313
-
Over-Encryption: Management of access control evolution on outsourced data
-
VLDB Endowment
-
DE CAPITANI DI VIMERCATI, S., FORESTI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2007. Over-Encryption: Management of access control evolution on outsourced data. In Proceedings of the International Conference on Very Large Databases (VLDB'07). VLDB Endowment, 123-134.
-
(2007)
Proceedings of the International Conference on Very Large Databases (VLDB'07)
, pp. 123-134
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
17
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
DE SANTIS, A., FERRARA, A.L., AND MASUCCI, B. 2004. Cryptographic key assignment schemes for any access control policy. Inform. Process. Lett. 92, 4, 199-205.
-
(2004)
Inform. Process. Lett.
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
18
-
-
0019057051
-
The design of a cryptography based secure file system
-
GUDES, E. 1980. The design of a cryptography based secure file system. IEEE Trans. Softw. Engin. 6, 5, 411-420.
-
(1980)
IEEE Trans. Softw. Engin.
, vol.6
, Issue.5
, pp. 411-420
-
-
Gudes, E.1
-
19
-
-
0036204131
-
Providing database as a service
-
IEEE Computer Society, Washington
-
HACIGÜMÜS, H., IYER, B., AND MEHROTRA, S. 2002a. Providing database as a service. In Proceedings of the International Conference on Data Engineering (ICDE'02). IEEE Computer Society, Washington, 29-39.
-
(2002)
Proceedings of the International Conference on Data Engineering (ICDE'02)
, pp. 29-39
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
20
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM, New York
-
HACIGÜMÜS, H., IYER, B., MEHROTRA, S., AND LI, C. 2002b. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD'02 International Conference on Management of Data. ACM, New York, 216-227.
-
(2002)
Proceedings of the ACM SIGMOD'02 International Conference on Management of Data
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
21
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
HARN, L. AND LIN, H. 1990. A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9, 6, 539-546.
-
(1990)
Comput. Secur.
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.2
-
22
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
HWANG, M. AND YANG, W. 2003. Controlling access in large partially ordered hierarchies using cryptographic keys. J. Syst. Softw. 67, 2, 99-107.
-
(2003)
J. Syst. Softw.
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.1
Yang, W.2
-
23
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Computer Society, Washington
-
KUSHILEVITZ, E. AND OSTROVSKY, R. 1997. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS'97). IEEE Computer Society, Washington, 364.
-
(1997)
Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS'97)
, pp. 364
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
24
-
-
0024738556
-
On the design of a single-key-lock mechanism based on Newton's interpolating polynomial
-
LIAW, H., WANG, S., AND LEI, C. 1989. On the design of a single-key-lock mechanism based on Newton's interpolating polynomial. IEEE Trans. Softw. Engin. 15, 9, 1135-1137.
-
(1989)
IEEE Trans. Softw. Engin.
, vol.15
, Issue.9
, pp. 1135-1137
-
-
Liaw, H.1
Wang, S.2
Lei, C.3
-
25
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MACKINNON, S., P. TAYLOR, MEIJER, H., AND AKL, S. 1985. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34, 9, 797-802.
-
(1985)
IEEE Trans. Comput.
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
27
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
MYKLETUN, E., NARASIMHA, M., AND TSUDIK, G. 2006. Authentication and integrity in outsourced databases. ACM Trans. Storage 2, 2, 107-138.
-
(2006)
ACM Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
28
-
-
14344253515
-
Analysis of SIGMOD's co-authorship graph
-
NASCIMENTO, M., SANDER, J., AND POUND, J. 2003. Analysis of SIGMOD's co-authorship graph. ACM SIGMOD Rec. 32, 3, 8-10.
-
(2003)
ACM SIGMOD Rec
, vol.32
, Issue.3
, pp. 8-10
-
-
Nascimento, M.1
Sander, J.2
Pound, J.3
-
29
-
-
77952018992
-
Harvesting credentials in trust negotiation as an honest-but-curious adversary
-
ACM, New York
-
OLSON, L.,ROSULEK, M., ANDWINSLETT,M. 2007. Harvesting credentials in trust negotiation as an honest-but-curious adversary. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES'07). ACM, New York, 64-67.
-
(2007)
Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES'07)
, pp. 64-67
-
-
Olson, L.1
Rosulek, M.2
Andwinslett, M.3
-
30
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, Eds. Springer
-
SAMARATI, P. AND DE CAPITANI DI VIMERCATI, S. 2001. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Eds. Springer, 137-196.
-
(2001)
Foundations of Security Analysis and Design
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
32
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
SANDHU, R. 1988. Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 2, 95-98.
-
(1988)
Inform. Process. Lett.
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.1
-
33
-
-
85082382669
-
On the twofish key schedule
-
Springer
-
SCHNEIER, B.,KELSEY, J.,WHITING, D.,WAGNER, D.,HALL, C., AND FERGUSON, N. 1998. On the twofish key schedule. In Proceedings of the ACM Symposium on Applied Computing (SAC'98). Springer, 27-42.
-
(1998)
Proceedings of the ACM Symposium on Applied Computing (SAC'98)
, pp. 27-42
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
34
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
SHEN, V. AND CHEN, T. 2002. A novel key management scheme based on discrete logarithms and polynomial interpolations. Comput. Secur. 21, 2, 164-171.
-
(2002)
Comput. Secur.
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.1
Chen, T.2
-
35
-
-
26444482007
-
Designing secure indexes for encrypted databases
-
Springer
-
SHMUELI, E., WAISENBERG, R., ELOVICI, Y., AND GUDES, E. 2005. Designing secure indexes for encrypted databases. In Proceedings of the Annual Working Conference on Database Security (DBSec'05). Springer, 54-68.
-
(2005)
Proceedings of the Annual Working Conference on Database Security (DBSec'05)
, pp. 54-68
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
40
-
-
77952056760
-
-
XML ENCRYPTION SYNTAX AND PROCESSING, W3C REC. 2002
-
XML ENCRYPTION SYNTAX AND PROCESSING, W3C REC. 2002. http://www.w3.org/ TR/xmlenc-core/.
-
-
-
|