-
1
-
-
0019573099
-
A database encryption system with subkeys
-
Davida, G., Wells, D., and Kam, J., A database encryption system with subkeys. ACM Transactions on Database Systems, 6: 312, 1981.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, pp. 312
-
-
Davida, G.1
Wells, D.2
Kam, J.3
-
2
-
-
0036204131
-
Providing database as a service
-
San Jose, CA. IEEE Computer Society, Washington, D.C
-
Hacigümüs, H., Iyer, B., and Mehrotra, S., Providing database as a service. In Proc. of the 18th International Conference on Data Engineering, San Jose, CA. IEEE Computer Society, Washington, D.C., 2002, 29.
-
(2002)
Proc. of the 18th International Conference on Data Engineering
, pp. 29
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
3
-
-
26444538232
-
A framework for efficient storage security in RDBMS
-
Bertino, E. et al., Eds, Crete, Greece. Springer, Heidelberg, Germany
-
Iyer, B. et al., A framework for efficient storage security in RDBMS. In Bertino, E. et al., Eds., Proc. of the International Conference on Extending Database Technology (EDBT 2004), vol. 2992 of Lecture Notes in Computer Science, Crete, Greece. Springer, Heidelberg, Germany, 2004, 147.
-
(2004)
Proc. of the International Conference on Extending Database Technology (EDBT 2004), vol. 2992 of Lecture Notes in Computer Science
, pp. 147
-
-
Iyer, B.1
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Jajodia, S., Atluri, V., and Jaeger, T., Eds, Washington, D.C., ACM Press, New York
-
Damiani, E. et al., Balancing confidentiality and efficiency in untrusted relational DBMSs. In Jajodia, S., Atluri, V., and Jaeger, T., Eds., Proc. of the 10thACMConference on Computer and Communications Security (CCS03), Washington, D.C., ACM Press, New York, 2003, 93.
-
(2003)
Proc. of the 10thACMConference on Computer and Communications Security (CCS03)
, pp. 93
-
-
Damiani, E.1
-
5
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
Lee, J., Li, J., Wndhang, K., and Lee, D., Eds, Jeju Island, Korea. Springer, Heidelberg, Germany
-
Hacigümüs, H., Iyer, B., and Mehrotra, S., Efficient execution of aggregation queries over encrypted relational databases. In Lee, J., Li, J., Wndhang, K., and Lee, D., Eds., Proc. of the 9th International Conference on Database Systems for Advanced Applications, vol. 2973 of Lecture Notes in Computer Science, Jeju Island, Korea. Springer, Heidelberg, Germany, 2004, 125.
-
(2004)
Proc. of the 9th International Conference on Database Systems for Advanced Applications, vol. 2973 of Lecture Notes in Computer Science
, pp. 125
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
6
-
-
84948123357
-
Implementation of a storage mechanism for untrusted DBMSs
-
Washington, D.C., IEEE Computer Society, Washington, D.C
-
Damiani, E. et al., Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington, D.C., IEEE Computer Society, Washington, D.C., 2003, 38.
-
(2003)
Proc. of the Second International IEEE Security in Storage Workshop
, pp. 38
-
-
Damiani, E.1
-
7
-
-
0036361105
-
Executing SQL over encrypted data in the databaseservice-provider model
-
Madison, WI, ACM Press, New York
-
Hacigümüs, H. et al., Executing SQL over encrypted data in the databaseservice-provider model. In Proc. of the ACM SIGMOD 2002, Madison, WI, ACM Press, New York, 2002, 216.
-
(2002)
Proc. of the ACM SIGMOD 2002
, pp. 216
-
-
Hacigümüs, H.1
-
8
-
-
85065578926
-
A privacy-preserving index for range queries
-
Nascimento, M. et al., Eds, Toronto, Canada. Morgan Kaufmann, San Francisco, CA
-
Hore, B., Mehrotra, S., and Tsudik, G., A privacy-preserving index for range queries. In Nascimento, M. et al., Eds., Proc. of the 30th International Conference on Very Large Data Bases, Toronto, Canada. Morgan Kaufmann, San Francisco, CA, 2004, 720.
-
(2004)
Proc. of the 30th International Conference on Very Large Data Bases
, pp. 720
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
9
-
-
65949090193
-
Fast query over encrypted character data in database
-
Wang, Z. et al., Fast query over encrypted character data in database. Communications in Information and Systems, 4: 289, 2004.
-
(2004)
Communications in Information and Systems
, vol.4
, pp. 289
-
-
Wang, Z.1
-
10
-
-
33746869680
-
Storage and query over encrypted character and numerical data in database
-
Shanghai, China. IEEE Computer Society, Washington, D.C
-
Wang, Z., Wang, W., and Shi, B., Storage and query over encrypted character and numerical data in database. In Proc. of the Fifth International Conference on Computer and Information Technology (CIT’05), Shanghai, China. IEEE Computer Society, Washington, D.C., 2005, 77.
-
(2005)
Proc. of the Fifth International Conference on Computer and Information Technology (CIT’05)
, pp. 77
-
-
Wang, Z.1
Wang, W.2
Shi, B.3
-
13
-
-
33749594681
-
Provable security for outsourcing database operations
-
Liu, L., Reuter, A., Whang, K., and Zhang, J., Eds, Atlanta, GA, IEEE Computer Society, Washington, D.C
-
Evdokimov, S., Fischmann, M., and Gunther, O., Provable security for outsourcing database operations. In Liu, L., Reuter, A., Whang, K., and Zhang, J., Eds., Proc. of the 22nd International Conference on Data Engineering (ICDE '06), Atlanta, GA, IEEE Computer Society, Washington, D.C., 2006, 117.
-
(2006)
Proc. of the 22nd International Conference on Data Engineering (ICDE '06)
, pp. 117
-
-
Evdokimov, S.1
Fischmann, M.2
Gunther, O.3
-
14
-
-
3142716056
-
Order preserving encryption for numeric data
-
Weikum, G., König, A., and Deßloch, S., Eds, Paris, France. ACM Press, New York
-
Agrawal, R. et al., Order preserving encryption for numeric data. In Weikum, G., König, A., and Deßloch, S., Eds., Proc. of the ACM SIGMOD 2004, Paris, France. ACM Press, New York, 2004, 563.
-
(2004)
Proc. of the ACM SIGMOD 2004
, pp. 563
-
-
Agrawal, R.1
-
16
-
-
35048901123
-
Public-key encryption with keyword search
-
Interlaken, Switzerland. Springer, Heidelberg, Germany
-
Boneh, D. et al., Public-key encryption with keyword search. In Proc. of the Eurocrypt 2004, vol. 3027 of Lecture Notes in Computer Science, Interlaken, Switzerland. Springer, Heidelberg, Germany, 2004, 506.
-
(2004)
Proc. of the Eurocrypt 2004, vol. 3027 of Lecture Notes in Computer Science
, pp. 506
-
-
Boneh, D.1
-
17
-
-
35048871887
-
Using secret sharing for searching in encrypted data
-
Jonker, W. and Petkovic, M., Eds, Toronto, Canada. Springer, Heidelberg, Germany
-
Brinkman, R., Doumen, J., and Jonker, W., Using secret sharing for searching in encrypted data. In Jonker, W. and Petkovic, M., Eds., Proc. of the Secure Data Management Workshop, vol. 3178 of Lecture Notes in Computer Science, Toronto, Canada. Springer, Heidelberg, Germany, 2004, 18.
-
(2004)
Proc. of the Secure Data Management Workshop, vol. 3178 of Lecture Notes in Computer Science
, pp. 18
-
-
Brinkman, R.1
Doumen, J.2
Jonker, W.3
-
19
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA, IEEE Computer Society, Washington, D.C
-
Song, D., Wagner, D., and Perrig, A., Practical techniques for searches on encrypted data. In Proc. of the 21st IEEE Computer Society Symposium on Research in Security and Privacy, Berkeley, CA, IEEE Computer Society, Washington, D.C., 2000, 44.
-
(2000)
Proc. of the 21st IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 44
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
20
-
-
26844577557
-
Building an encrypted and searchable audit log
-
San Diego, CA. Internet Society, Washington, D.C
-
Waters, B. et al., Building an encrypted and searchable audit log. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA. Internet Society, Washington, D.C., 2004.
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
-
-
Waters, B.1
-
21
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D. and Franklin, M., Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32: 586, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
85056532138
-
Measuring inference exposure in outsourced encrypted databases
-
Gollmann, D., Massacci, F., and Yautsiukhin, A., Eds, Milan, Italy. Springer, Heidelberg, Germany
-
Damiani, E. et al., Measuring inference exposure in outsourced encrypted databases. In Gollmann, D., Massacci, F., and Yautsiukhin, A., Eds., Proc. of the First Workshop on Quality of Protection, vol. 23 of Advances in Information Security, Milan, Italy. Springer, Heidelberg, Germany, 2005.
-
(2005)
Proc. of the First Workshop on Quality of Protection, vol. 23 of Advances in Information Security
-
-
Damiani, E.1
-
25
-
-
84882768721
-
Selective data encryption in outsourced dynamic environments
-
Electronic Notes in Theoretical Computer Science, Bertinoro, Italy. Elsevier, Amsterdam, the Netherlands
-
Damiani, E. et al., Selective data encryption in outsourced dynamic environments. In Proc. of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006), Electronic Notes in Theoretical Computer Science, Bertinoro, Italy. Elsevier, Amsterdam, the Netherlands, 2006.
-
(2006)
Proc. of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006)
-
-
Damiani, E.1
-
26
-
-
0023580702
-
On some cryptographic solutions for access control in a tree hierarchy
-
Dallas, TX. IEEE Computer Society, Washington, D.C
-
Sandhu, R., On some cryptographic solutions for access control in a tree hierarchy. In Proc. of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow, Dallas, TX. IEEE Computer Society, Washington, D.C., 1987, 405.
-
(1987)
Proc. of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow
, pp. 405
-
-
Sandhu, R.1
-
27
-
-
0019057051
-
The design of a cryptography-based secure file system
-
Gudes, E., The design of a cryptography-based secure file system. IEEE Transactions on Software Engineering, 6: 411, 1980.
-
(1980)
IEEE Transactions on Software Engineering
, vol.6
, pp. 411
-
-
Gudes, E.1
-
28
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu, R., Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27: 95, 1988.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95
-
-
Sandhu, R.1
-
29
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S. and Taylor, P., Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1: 239, 1983.
-
(1983)
ACM Transactions on Computer System
, vol.1
, pp. 239
-
-
Akl, S.1
Taylor, P.2
-
30
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Atluri, V., Meadows, C., and Juels, A., Eds, Alexandria, VA, ACM SIGSAC
-
Atallah, M., Frikken, K., and Blanton, M., Dynamic and efficient key management for access hierarchies. In Atluri, V., Meadows, C., and Juels, A., Eds., Proc. of the 12th ACM Conference on Computer and Communications Security (CCS05), Alexandria, VA, ACM SIGSAC, 2005, 190.
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security (CCS05)
, pp. 190
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
31
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
De Santis, A., Ferrara, A.L., and Masucci, B., Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett., 92(4): 199-205, 2004.
-
(2004)
Inf. Process. Lett.
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
32
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn, L. and Lin, H., A cryptographic key generation scheme for multilevel data security. Computers and Security, 9: 539, 1990.
-
(1990)
Computers and Security
, vol.9
, pp. 539
-
-
Harn, L.1
Lin, H.2
-
33
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
Hwang, M. and Yang, W., Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67: 99, 2003.
-
(2003)
The Journal of Systems and Software
, vol.67
, pp. 99
-
-
Hwang, M.1
Yang, W.2
-
34
-
-
0024738556
-
On the design of a single-key-lock mechanism based on Newton’s interpolating polynomial
-
Liaw, H., Wang, S., and Lei, C., On the design of a single-key-lock mechanism based on Newton’s interpolating polynomial. IEEE Transaction on Software Engineering, 15: 1135, 1989.
-
(1989)
IEEE Transaction on Software Engineering
, vol.15
, pp. 1135
-
-
Liaw, H.1
Wang, S.2
Lei, C.3
-
35
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon, S. et al., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34: 797, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, pp. 797
-
-
MacKinnon, S.1
-
36
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
Shen, V. and Chen, T., A novel key management scheme based on discrete logarithms and polynomial interpolations. Computer and Security, 21: 164, 2002.
-
(2002)
Computer and Security
, vol.21
, pp. 164
-
-
Shen, V.1
Chen, T.2
-
37
-
-
33947630349
-
On key assignment for hierarchical access control
-
Los Alamitos, CA. IEEE Computer Society, Washington, D.C
-
Crampton, J., Martin, K., and Wild, P., On key assignment for hierarchical access control. In Proc. of the 19th IEEE Computer Security Foundations Workshop (CSFW’06), Los Alamitos, CA. IEEE Computer Society, Washington, D.C., 2006, 98.
-
(2006)
Proc. of the 19th IEEE Computer Security Foundations Workshop (CSFW’06)
, pp. 98
-
-
Crampton, J.1
Martin, K.2
Wild, P.3
-
39
-
-
0034871635
-
Hierarchy-based access control in distributed environments
-
Helsinki, Finland. IEEE Computer Society, Washington, D.C
-
Birget, J. et al., Hierarchy-based access control in distributed environments. In Proc. of the IEEE International Conference on Communications, vol. 1, Helsinki, Finland. IEEE Computer Society, Washington, D.C., 2002, 229.
-
(2002)
Proc. of the IEEE International Conference on Communications
, vol.1
, pp. 229
-
-
Birget, J.1
-
40
-
-
0242456749
-
A cryptographic solution to implement access control in a hierarchy and more
-
Monterey, CA. ACM Press, New York
-
Ray, I., Ray, I., and Narasimhamurthi, N., A cryptographic solution to implement access control in a hierarchy and more. In Proc. of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT’02), Monterey, CA. ACM Press, New York, 2002, 65.
-
(2002)
Proc. of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT’02)
, pp. 65
-
-
Ray, I.1
Ray, I.2
Narasimhamurthi, N.3
-
41
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
Tsai, H. and Chang, C., A cryptographic implementation for dynamic access control in a user hierarchy. Computer and Security, 14: 159, 1995.
-
(1995)
Computer and Security
, vol.14
, pp. 159
-
-
Tsai, H.1
Chang, C.2
-
42
-
-
0033893174
-
Secure group communications using key graphs
-
Wong, C., Gouda, M., and Lam, S., Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8: 16, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, pp. 16
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
43
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Hong Kong, China. IEEE Computer Society, Washington, D.C
-
Sun, Y. and Liu, K., Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, vol. 2, Hong Kong, China. IEEE Computer Society, Washington, D.C., 2004, 1296.
-
(2004)
Proc. of the IEEE Infocom
, vol.2
, pp. 1296
-
-
Sun, Y.1
Liu, K.2
-
44
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
Bernstein, P. et al., Eds, Hong Kong, China. Morgan Kaufmann, San Francisco, CA
-
Bouganim, L. and Pucheral, P., Chip-secured data access: Confidential data on untrusted servers. In Bernstein, P. et al., Eds., Proc. of the 28th International Conference on Very Large Data Bases, Hong Kong, China. Morgan Kaufmann, San Francisco, CA, 2002, 131.
-
(2002)
Proc. of the 28th International Conference on Very Large Data Bases
, pp. 131
-
-
Bouganim, L.1
Pucheral, P.2
-
45
-
-
33646373081
-
Chip-secured data access: Reconciling access rights with data encryption
-
Freytag, J., Lockemann, P., Abiteboul, S., Carey, M., Selinger, P., and Heuer, A., Eds, Berlin, Germany. Morgan Kaufmann, San Francisco, CA
-
Bouganim, L. et al., Chip-secured data access: Reconciling access rights with data encryption. In Freytag, J., Lockemann, P., Abiteboul, S., Carey, M., Selinger, P., and Heuer, A., Eds., Proc. of the 29th VLDB Conference, Berlin, Germany. Morgan Kaufmann, San Francisco, CA, 2003, 1133.
-
(2003)
Proc. of the 29th VLDB Conference
, pp. 1133
-
-
Bouganim, L.1
|