-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N.R. Adam, J.C.Worthmann Security-control methods for statistical databases: a comparative study In ACM Computing Surveys, Vol 21, No. 4, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
-
-
Adam, N.R.1
Worthmann, J.C.2
-
2
-
-
84890151152
-
-
Advanced Encryption Standard, NIST
-
Advanced Encryption Standard, NIST. FIPS PUB197. (2001)
-
(2001)
FIPS PUB197.
-
-
-
3
-
-
84863338303
-
A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, U. Srivastava, D. Thomas, Y. Xu. Two Can Keep a Secret: A Distributed Architecture for Secure Database Services In Proc. of CIDR 2005.
-
(2005)
Proc. of CIDR
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Srivastava, U.6
Thomas, D.7
Xu, Y.8
-
6
-
-
0023408117
-
Processing encrypted data
-
N. Ahituv, Y. Lapid, S. Neumann Processing Encrypted Data In Communications of the ACM, 1987 Vol. 30, 9, pp.777-780
-
(1987)
Communications of the ACM
, vol.30
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
7
-
-
34547239322
-
Monrose Achieving Efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, F. Monrose Achieving Efficient conjunctive keyword searches over encrypted data. In ICICS 2005.
-
(2005)
ICICS
-
-
Ballard, L.1
Kamara, S.F.2
-
9
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
L. Bouganim, and P. Pucheral. Chip-Secured Data Access: Confidential Data on Untrusted Servers In Proc. of VLDB 2002.
-
(2002)
Proc. of VLDB
-
-
Bouganim, L.1
Pucheral, P.2
-
13
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
E. Damiani et al. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs In CCS, 2003.
-
(2003)
CCS
-
-
Damiani, E.1
-
14
-
-
33244469997
-
Key management for multi-user encrypted databases
-
E. Damiani et al. Key Management for Multi-User Encrypted Databases In StorageSS, 2005.
-
(2005)
StorageSS
-
-
Damiani, E.1
-
15
-
-
84890216225
-
-
Data Encryption Standard (DES), NIST
-
Data Encryption Standard (DES), NIST. FIPS 46-3. (1993)
-
(1993)
FIPS
, pp. 46-53
-
-
-
16
-
-
0030577321
-
A new privacy homomorphism and applications
-
J. Domingo-Ferrer A New Privacy Homomorphism and Applications In Information Processing Letters, 6(5):277-282, 1996.
-
(1996)
Information Processing Letters
, vol.6
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
18
-
-
33244488406
-
-
Technical report 2003/216, In IACR ePrint Cryptography Archive
-
E-J. Goh Secure Indexes. Technical report 2003/216, In IACR ePrint Cryptography Archive, (2003). See http://eprint.iacr.org/2003/216.
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
-
20
-
-
0027608375
-
Query eveluation techniques for large databases
-
G. Graefe. Query eveluation techniques for large databases. ACM Computing Surveys, 25(2):73-170, 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.2
, pp. 73-170
-
-
Graefe, G.1
-
24
-
-
33745264694
-
Query optimization in encrypted database systems
-
H. Hac?gumu̧s, B. Iyer, S. Mehrotra Query Optimization in Encrypted Database Systems, In DASFAA, 2005.
-
(2005)
DASFAA
-
-
Hacgumus, H.1
Iyer, B.2
Mehrotra, S.3
-
25
-
-
35048873707
-
-
Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine
-
H. Hac?gumu̧s. Privacy in Database-as-a-Service Model. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine, 2003.
-
(2003)
Privacy in Database-as-a-Service Model
-
-
Hacgumus, H.1
-
26
-
-
0036361105
-
Mehrotra Executing SQL over encrypted data in the database-service- provider model
-
H. Hac?gumu̧s, B. Iyer, C. Li and S. Mehrotra Executing SQL over encrypted data in the database-service-provider model. In Proc. SIGMOD, 2002.
-
(2002)
Proc. SIGMOD
-
-
Hacgumus, H.1
Iyer, B.2
Li, C.S.3
-
27
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
H. Hac?gumu̧s, B. Iyer, and S. Mehrotra Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In DASFAA, 2004.
-
(2004)
DASFAA
-
-
Hacgumus, H.1
Iyer, B.2
Mehrotra, S.3
-
28
-
-
84890212014
-
Performance concious key management in encrypted databases
-
H. Hac?gumu̧s, Sharad Mehrotra Performance concious key management in Encrypted Databases In DBSec, 2004.
-
(2004)
DBSec
-
-
Hacgumus, H.1
Mehrotra, S.2
-
31
-
-
84890187764
-
-
Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine
-
B. Hore. Storing and Querying Data Securely in Untrusted Environments. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine, 2007.
-
(2007)
Storing and Querying Data Securely in Untrusted Environments
-
-
Hore, B.1
-
35
-
-
84876680975
-
GVault: A gmail based cryptographic network file system
-
R.C. Jammalamadaka, R. Gamboni, S. Mehrotra, K. Seamons, N. Venkatasubramanian gVault:A Gmail Based Cryptographic Network File System. In proceedings of 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2007.
-
(2007)
Proceedings of 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Jammalamadaka, R.C.1
Gamboni, R.2
Mehrotra, S.3
Seamons, K.4
Venkatasubramanian Gvault, N.5
-
37
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimhan, G. Tsudik Authentication and Integrity in Outsourced Databases In NDSS, 2004.
-
(2004)
NDSS
-
-
Mykletun, E.1
Narasimhan, M.2
Tsudik, G.3
-
38
-
-
33745798432
-
Integrity of outsourced databases with signature aggregation and chaining
-
M. Narasimhan, G. Tsudik DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining In CIKM, 2005.
-
(2005)
CIKM
-
-
Narasimhan, M.1
Tsudik Dsac, G.2
-
41
-
-
85051567368
-
Access path selection in relational database management systems
-
P. Sellinger, M. Astrahan, D. D. Chamberlin, R. A. Lorie, and T. G. Price. Access Path Selection in Relational Database Management Systems. In Proc. of ACM SIGMOD, 1979.
-
(1979)
Proc. of ACM SIGMOD
-
-
Sellinger, P.1
Astrahan, M.2
Chamberlin, D.D.3
Lorie, R.A.4
Price, T.G.5
-
43
-
-
33745601730
-
Query execution assurance for outsourced databases
-
R. Sion Query Execution Assurance for Outsourced Databases In VLDB 2005.
-
(2005)
VLDB
-
-
Sion, R.1
-
45
-
-
84893821498
-
Efficient secure query evaluation over encrypted xml databases
-
H. Wang, L. Lakshmanan Efficient Secure Query Evaluation over Encrypted XML Databases In VLDB, 2006.
-
(2006)
VLDB
-
-
Wang, H.1
Lakshmanan, L.2
|