-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France
-
Agrawal R, Kierman J, Srikant R, Xu Y. Order preserving encryption for numeric data. In: Proceedings of SIGMOD 2004, Paris, France; 2004.
-
(2004)
Proceedings of SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. Akl, and P. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer System 1 3 1983 239 248
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
4
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes
-
Alexandria, USA
-
Ateniese G, De Santis A, Ferrara A, Masucci B. Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of ACM CCS 2006, Alexandria, USA; 2006.
-
(2006)
Proceedings of ACM CCS 2006
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.3
Masucci, B.4
-
5
-
-
78649858433
-
Efficient key management for enforcing access control in outsourced scenarios
-
Cyprus
-
Blundo C, Cimato S, De Capitani di Vimercati S, De Santis A, Foresti S, Paraboschi S, Samarati P. Efficient key management for enforcing access control in outsourced scenarios. In: Proceedings of IFIP SEC 2009, Cyprus; 2009.
-
(2009)
Proceedings of IFIP SEC 2009
-
-
Blundo, C.1
Cimato, S.2
De Capitani Di Vimercati, S.3
De Santis, A.4
Foresti, S.5
Paraboschi, S.6
Samarati, P.7
-
6
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati Modeling and assessing inference exposure in encrypted databases ACM Transactions on Information and System Security 8 1 2005 119 152
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
77955709597
-
Selective data encryption in outsourced dynamic environments
-
Bertinoro, Italy
-
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective data encryption in outsourced dynamic environments. In: Proceedings of VODCA 2006, Bertinoro, Italy; 2006.
-
(2006)
Proceedings of VODCA 2006
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
Sandton, South Africa
-
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Proceedings of IFIP SEC 2007, Sandton, South Africa; 2007.
-
(2007)
Proceedings of IFIP SEC 2007
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
Vienna, Austria
-
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of the 33rd VLDB Conference, Vienna, Austria; 2007a.
-
(2007)
Proceedings of the 33rd VLDB Conference
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
Fairfax, USA
-
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. A data outsourcing architecture combining cryptography and access control. In: Proceedings of CSAW 2007, Fairfax, USA; 2007b.
-
(2007)
Proceedings of CSAW 2007
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
A. De Santis, A. Ferrara, and B. Masucci Cryptographic key assignment schemes for any access control policy Information Processing Letters 92 4 2004 199 205
-
(2004)
Information Processing Letters
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.2
Masucci, B.3
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, USA
-
Hacigümüs H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD 2002, Madison, USA; 2002a.
-
(2002)
Proceedings of SIGMOD 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
15
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S. MacKinnon, P. Taylor, H. Meijer, and S. Akl An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transactions on Computers 34 9 1985 797 802
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
17
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 2 1988 95 98
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.1
-
19
-
-
67649643946
-
Designing secure indexes for encrypted databases
-
Storrs, USA
-
Shmueli E, Waisenberg R, Elovici Y, Gudes E. Designing secure indexes for encrypted databases. In: Proceedings of IFIP DBSec 2005, Storrs, USA; 2005.
-
(2005)
Proceedings of IFIP DBSec 2005
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
|