메뉴 건너뛰기




Volumn , Issue , 2008, Pages 163-190

Managing and querying encrypted data

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954801237     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-48533-1_7     Document Type: Chapter
Times cited : (13)

References (48)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N.R. Adam, J.C.Worthmann Security-control methods for statistical databases: a comparative study In ACM Computing Surveys, Vol 21, No. 4, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4
    • Adam, N.R.1    Worthmann, J.C.2
  • 2
    • 84890151152 scopus 로고    scopus 로고
    • Advanced Encryption Standard, NIST
    • Advanced Encryption Standard, NIST. FIPS PUB197. (2001)
    • (2001) FIPS PUB197.
  • 7
    • 34547239322 scopus 로고    scopus 로고
    • Monrose Achieving Efficient conjunctive keyword searches over encrypted data
    • L. Ballard, S. Kamara, F. Monrose Achieving Efficient conjunctive keyword searches over encrypted data. In ICICS 2005.
    • (2005) ICICS
    • Ballard, L.1    Kamara, S.F.2
  • 9
    • 16644396185 scopus 로고    scopus 로고
    • Chip-secured data access: Confidential data on untrusted servers
    • L. Bouganim, and P. Pucheral. Chip-Secured Data Access: Confidential Data on Untrusted Servers In Proc. of VLDB 2002.
    • (2002) Proc. of VLDB
    • Bouganim, L.1    Pucheral, P.2
  • 13
    • 18744366643 scopus 로고    scopus 로고
    • Balancing confidentiality and efficiency in untrusted relational DBMSs
    • E. Damiani et al. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs In CCS, 2003.
    • (2003) CCS
    • Damiani, E.1
  • 14
    • 33244469997 scopus 로고    scopus 로고
    • Key management for multi-user encrypted databases
    • E. Damiani et al. Key Management for Multi-User Encrypted Databases In StorageSS, 2005.
    • (2005) StorageSS
    • Damiani, E.1
  • 15
    • 84890216225 scopus 로고
    • Data Encryption Standard (DES), NIST
    • Data Encryption Standard (DES), NIST. FIPS 46-3. (1993)
    • (1993) FIPS , pp. 46-53
  • 16
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • J. Domingo-Ferrer A New Privacy Homomorphism and Applications In Information Processing Letters, 6(5):277-282, 1996.
    • (1996) Information Processing Letters , vol.6 , Issue.5 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 18
    • 33244488406 scopus 로고    scopus 로고
    • Technical report 2003/216, In IACR ePrint Cryptography Archive
    • E-J. Goh Secure Indexes. Technical report 2003/216, In IACR ePrint Cryptography Archive, (2003). See http://eprint.iacr.org/2003/216.
    • (2003) Secure Indexes
    • Goh, E.-J.1
  • 20
    • 0027608375 scopus 로고
    • Query eveluation techniques for large databases
    • G. Graefe. Query eveluation techniques for large databases. ACM Computing Surveys, 25(2):73-170, 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.2 , pp. 73-170
    • Graefe, G.1
  • 24
    • 33745264694 scopus 로고    scopus 로고
    • Query optimization in encrypted database systems
    • H. Hac?gumu̧s, B. Iyer, S. Mehrotra Query Optimization in Encrypted Database Systems, In DASFAA, 2005.
    • (2005) DASFAA
    • Hacgumus, H.1    Iyer, B.2    Mehrotra, S.3
  • 25
    • 35048873707 scopus 로고    scopus 로고
    • Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine
    • H. Hac?gumu̧s. Privacy in Database-as-a-Service Model. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine, 2003.
    • (2003) Privacy in Database-as-a-Service Model
    • Hacgumus, H.1
  • 26
    • 0036361105 scopus 로고    scopus 로고
    • Mehrotra Executing SQL over encrypted data in the database-service- provider model
    • H. Hac?gumu̧s, B. Iyer, C. Li and S. Mehrotra Executing SQL over encrypted data in the database-service-provider model. In Proc. SIGMOD, 2002.
    • (2002) Proc. SIGMOD
    • Hacgumus, H.1    Iyer, B.2    Li, C.S.3
  • 27
    • 16644385952 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • H. Hac?gumu̧s, B. Iyer, and S. Mehrotra Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In DASFAA, 2004.
    • (2004) DASFAA
    • Hacgumus, H.1    Iyer, B.2    Mehrotra, S.3
  • 28
    • 84890212014 scopus 로고    scopus 로고
    • Performance concious key management in encrypted databases
    • H. Hac?gumu̧s, Sharad Mehrotra Performance concious key management in Encrypted Databases In DBSec, 2004.
    • (2004) DBSec
    • Hacgumus, H.1    Mehrotra, S.2
  • 29
    • 80155156507 scopus 로고    scopus 로고
    • Efficient key updates in encrypted database systems
    • H. Hac?gumu̧s, Sharad Mehrotra Efficient Key Updates in Encrypted Database Systems In Secure Data Management, 2005.
    • (2005) Secure Data Management
    • Hacgumus, H.1    Mehrotra, S.2
  • 30
  • 31
    • 84890187764 scopus 로고    scopus 로고
    • Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine
    • B. Hore. Storing and Querying Data Securely in Untrusted Environments. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine, 2007.
    • (2007) Storing and Querying Data Securely in Untrusted Environments
    • Hore, B.1
  • 37
    • 24944520998 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimhan, G. Tsudik Authentication and Integrity in Outsourced Databases In NDSS, 2004.
    • (2004) NDSS
    • Mykletun, E.1    Narasimhan, M.2    Tsudik, G.3
  • 38
    • 33745798432 scopus 로고    scopus 로고
    • Integrity of outsourced databases with signature aggregation and chaining
    • M. Narasimhan, G. Tsudik DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining In CIKM, 2005.
    • (2005) CIKM
    • Narasimhan, M.1    Tsudik Dsac, G.2
  • 43
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • R. Sion Query Execution Assurance for Outsourced Databases In VLDB 2005.
    • (2005) VLDB
    • Sion, R.1
  • 44
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for search on encrypted data
    • D. Song and D. Wagner and A. Perrig. Practical Techniques for Search on Encrypted Data. In Proc. of IEEE SRSP, 2000.
    • (2000) Proc. of IEEE SRSP
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 45
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted xml databases
    • H. Wang, L. Lakshmanan Efficient Secure Query Evaluation over Encrypted XML Databases In VLDB, 2006.
    • (2006) VLDB
    • Wang, H.1    Lakshmanan, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.