메뉴 건너뛰기




Volumn , Issue , 2007, Pages 381-408

Privacy of outsourced data

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954468586     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (3)

References (45)
  • 4
    • 18744366643 scopus 로고    scopus 로고
    • Balancing confidentiality and efficiency in untrusted relational DBMSs
    • Jajodia, S., Atluri, V., and Jaeger, T., Eds, Washington, D.C., ACM Press, New York
    • Damiani, E. et al., Balancing confidentiality and efficiency in untrusted relational DBMSs. In Jajodia, S., Atluri, V., and Jaeger, T., Eds., Proc. of the 10thACMConference on Computer and Communications Security (CCS03), Washington, D.C., ACM Press, New York, 2003, 93.
    • (2003) Proc. of the 10thACMConference on Computer and Communications Security (CCS03) , pp. 93
    • Damiani, E.1
  • 6
    • 84948123357 scopus 로고    scopus 로고
    • Implementation of a storage mechanism for untrusted DBMSs
    • Washington, D.C., IEEE Computer Society, Washington, D.C
    • Damiani, E. et al., Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington, D.C., IEEE Computer Society, Washington, D.C., 2003, 38.
    • (2003) Proc. of the Second International IEEE Security in Storage Workshop , pp. 38
    • Damiani, E.1
  • 7
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the databaseservice-provider model
    • Madison, WI, ACM Press, New York
    • Hacigümüs, H. et al., Executing SQL over encrypted data in the databaseservice-provider model. In Proc. of the ACM SIGMOD 2002, Madison, WI, ACM Press, New York, 2002, 216.
    • (2002) Proc. of the ACM SIGMOD 2002 , pp. 216
    • Hacigümüs, H.1
  • 8
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Nascimento, M. et al., Eds, Toronto, Canada. Morgan Kaufmann, San Francisco, CA
    • Hore, B., Mehrotra, S., and Tsudik, G., A privacy-preserving index for range queries. In Nascimento, M. et al., Eds., Proc. of the 30th International Conference on Very Large Data Bases, Toronto, Canada. Morgan Kaufmann, San Francisco, CA, 2004, 720.
    • (2004) Proc. of the 30th International Conference on Very Large Data Bases , pp. 720
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 9
    • 65949090193 scopus 로고    scopus 로고
    • Fast query over encrypted character data in database
    • Wang, Z. et al., Fast query over encrypted character data in database. Communications in Information and Systems, 4: 289, 2004.
    • (2004) Communications in Information and Systems , vol.4 , pp. 289
    • Wang, Z.1
  • 13
    • 33749594681 scopus 로고    scopus 로고
    • Provable security for outsourcing database operations
    • Liu, L., Reuter, A., Whang, K., and Zhang, J., Eds, Atlanta, GA, IEEE Computer Society, Washington, D.C
    • Evdokimov, S., Fischmann, M., and Gunther, O., Provable security for outsourcing database operations. In Liu, L., Reuter, A., Whang, K., and Zhang, J., Eds., Proc. of the 22nd International Conference on Data Engineering (ICDE '06), Atlanta, GA, IEEE Computer Society, Washington, D.C., 2006, 117.
    • (2006) Proc. of the 22nd International Conference on Data Engineering (ICDE '06) , pp. 117
    • Evdokimov, S.1    Fischmann, M.2    Gunther, O.3
  • 14
    • 3142716056 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data
    • Weikum, G., König, A., and Deßloch, S., Eds, Paris, France. ACM Press, New York
    • Agrawal, R. et al., Order preserving encryption for numeric data. In Weikum, G., König, A., and Deßloch, S., Eds., Proc. of the ACM SIGMOD 2004, Paris, France. ACM Press, New York, 2004, 563.
    • (2004) Proc. of the ACM SIGMOD 2004 , pp. 563
    • Agrawal, R.1
  • 21
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M., Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32: 586, 2003.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586
    • Boneh, D.1    Franklin, M.2
  • 23
    • 85056532138 scopus 로고    scopus 로고
    • Measuring inference exposure in outsourced encrypted databases
    • Gollmann, D., Massacci, F., and Yautsiukhin, A., Eds, Milan, Italy. Springer, Heidelberg, Germany
    • Damiani, E. et al., Measuring inference exposure in outsourced encrypted databases. In Gollmann, D., Massacci, F., and Yautsiukhin, A., Eds., Proc. of the First Workshop on Quality of Protection, vol. 23 of Advances in Information Security, Milan, Italy. Springer, Heidelberg, Germany, 2005.
    • (2005) Proc. of the First Workshop on Quality of Protection, vol. 23 of Advances in Information Security
    • Damiani, E.1
  • 25
    • 84882768721 scopus 로고    scopus 로고
    • Selective data encryption in outsourced dynamic environments
    • Electronic Notes in Theoretical Computer Science, Bertinoro, Italy. Elsevier, Amsterdam, the Netherlands
    • Damiani, E. et al., Selective data encryption in outsourced dynamic environments. In Proc. of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006), Electronic Notes in Theoretical Computer Science, Bertinoro, Italy. Elsevier, Amsterdam, the Netherlands, 2006.
    • (2006) Proc. of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006)
    • Damiani, E.1
  • 27
    • 0019057051 scopus 로고
    • The design of a cryptography-based secure file system
    • Gudes, E., The design of a cryptography-based secure file system. IEEE Transactions on Software Engineering, 6: 411, 1980.
    • (1980) IEEE Transactions on Software Engineering , vol.6 , pp. 411
    • Gudes, E.1
  • 28
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu, R., Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27: 95, 1988.
    • (1988) Information Processing Letters , vol.27 , pp. 95
    • Sandhu, R.1
  • 29
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S. and Taylor, P., Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1: 239, 1983.
    • (1983) ACM Transactions on Computer System , vol.1 , pp. 239
    • Akl, S.1    Taylor, P.2
  • 31
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • De Santis, A., Ferrara, A.L., and Masucci, B., Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett., 92(4): 199-205, 2004.
    • (2004) Inf. Process. Lett. , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 32
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L. and Lin, H., A cryptographic key generation scheme for multilevel data security. Computers and Security, 9: 539, 1990.
    • (1990) Computers and Security , vol.9 , pp. 539
    • Harn, L.1    Lin, H.2
  • 33
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • Hwang, M. and Yang, W., Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67: 99, 2003.
    • (2003) The Journal of Systems and Software , vol.67 , pp. 99
    • Hwang, M.1    Yang, W.2
  • 34
    • 0024738556 scopus 로고
    • On the design of a single-key-lock mechanism based on Newton’s interpolating polynomial
    • Liaw, H., Wang, S., and Lei, C., On the design of a single-key-lock mechanism based on Newton’s interpolating polynomial. IEEE Transaction on Software Engineering, 15: 1135, 1989.
    • (1989) IEEE Transaction on Software Engineering , vol.15 , pp. 1135
    • Liaw, H.1    Wang, S.2    Lei, C.3
  • 35
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon, S. et al., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34: 797, 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , pp. 797
    • MacKinnon, S.1
  • 36
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen, V. and Chen, T., A novel key management scheme based on discrete logarithms and polynomial interpolations. Computer and Security, 21: 164, 2002.
    • (2002) Computer and Security , vol.21 , pp. 164
    • Shen, V.1    Chen, T.2
  • 39
    • 0034871635 scopus 로고    scopus 로고
    • Hierarchy-based access control in distributed environments
    • Helsinki, Finland. IEEE Computer Society, Washington, D.C
    • Birget, J. et al., Hierarchy-based access control in distributed environments. In Proc. of the IEEE International Conference on Communications, vol. 1, Helsinki, Finland. IEEE Computer Society, Washington, D.C., 2002, 229.
    • (2002) Proc. of the IEEE International Conference on Communications , vol.1 , pp. 229
    • Birget, J.1
  • 41
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • Tsai, H. and Chang, C., A cryptographic implementation for dynamic access control in a user hierarchy. Computer and Security, 14: 159, 1995.
    • (1995) Computer and Security , vol.14 , pp. 159
    • Tsai, H.1    Chang, C.2
  • 43
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Hong Kong, China. IEEE Computer Society, Washington, D.C
    • Sun, Y. and Liu, K., Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, vol. 2, Hong Kong, China. IEEE Computer Society, Washington, D.C., 2004, 1296.
    • (2004) Proc. of the IEEE Infocom , vol.2 , pp. 1296
    • Sun, Y.1    Liu, K.2
  • 44
    • 16644396185 scopus 로고    scopus 로고
    • Chip-secured data access: Confidential data on untrusted servers
    • Bernstein, P. et al., Eds, Hong Kong, China. Morgan Kaufmann, San Francisco, CA
    • Bouganim, L. and Pucheral, P., Chip-secured data access: Confidential data on untrusted servers. In Bernstein, P. et al., Eds., Proc. of the 28th International Conference on Very Large Data Bases, Hong Kong, China. Morgan Kaufmann, San Francisco, CA, 2002, 131.
    • (2002) Proc. of the 28th International Conference on Very Large Data Bases , pp. 131
    • Bouganim, L.1    Pucheral, P.2
  • 45
    • 33646373081 scopus 로고    scopus 로고
    • Chip-secured data access: Reconciling access rights with data encryption
    • Freytag, J., Lockemann, P., Abiteboul, S., Carey, M., Selinger, P., and Heuer, A., Eds, Berlin, Germany. Morgan Kaufmann, San Francisco, CA
    • Bouganim, L. et al., Chip-secured data access: Reconciling access rights with data encryption. In Freytag, J., Lockemann, P., Abiteboul, S., Carey, M., Selinger, P., and Heuer, A., Eds., Proc. of the 29th VLDB Conference, Berlin, Germany. Morgan Kaufmann, San Francisco, CA, 2003, 1133.
    • (2003) Proc. of the 29th VLDB Conference , pp. 1133
    • Bouganim, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.