메뉴 건너뛰기




Volumn 6, Issue 8, 2010, Pages 2767-2777

Integrated privacy protection and access control over outsourced database services

Author keywords

Access control; Attribute partition; Data privacy; Encryption; Outsourced database services; User privacy

Indexed keywords

ATTRIBUTE PARTITION; COMMUNICATION COMPLEXITY; DATA CONFIDENTIALITY; DATA-BASE SERVERS; DATABASE SERVICE; ENCRYPTION; FLEXIBLE DEFINITION; LEGAL REGULATION; NEW MODEL; PRIVACY CONSTRAINTS; PRIVACY PROTECTION; PRIVACY REQUIREMENTS; PRIVATE INFORMATION RETRIEVAL; REAL-WORLD APPLICATION; RELATIONAL SCHEMAS; SENSITIVE INFORMATIONS; USER PRIVACY;

EID: 77957769385     PISSN: 15539105     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (16)
  • 2
    • 33745623486 scopus 로고    scopus 로고
    • Efficient execution of aggregration queries over encrypted relation databases
    • S.Mehrotra, H.Hacigumus, and B.Iyer. Efficient execution of aggregration queries over encrypted relation databases[C]. Proc. of DASFAA, 2004, pp125-136
    • (2004) Proc. of DASFAA , pp. 125-136
    • Mehrotra, S.1    Hacigumus, H.2    Iyer, B.3
  • 3
    • 3142716056 scopus 로고    scopus 로고
    • Fine order-preserving encryption for numeric data
    • Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Fine order-preserving encryption for numeric data[C]. Proc. of ICDM, 2004, pp563-574
    • (2004) Proc. of ICDM , pp. 563-574
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 5
  • 6
    • 84863338303 scopus 로고    scopus 로고
    • Two can keep a secret: a distributed aritecture for secure database services
    • G.Aggrawal, M.Bawa, P.Ganesan, et al. Two can keep a secret: a distributed aritecture for secure database services[C]. Proc. of CIDR, 2005, pp186-199
    • (2005) Proc. of CIDR , pp. 186-199
    • Aggrawal, G.1    Bawa, M.2    Ganesan, P.3
  • 9
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: single database, computationally-privacy information retrieval
    • E.Kushilevitz, R.Ostrovsky. Replication is not needed: single database, computationally-privacy information retrieval[C]. Proc. of FOCS, 1997, pp364-373
    • (1997) Proc. of FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 10
    • 84937574654 scopus 로고    scopus 로고
    • A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication
    • Y.Gertner, S.Goldwasser, T.Malkin. A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication[C]. Proc. of RANDOM, 1998, pp200-217
    • (1998) Proc. of RANDOM , pp. 200-217
    • Gertner, Y.1    Goldwasser, S.2    Malkin, T.3
  • 12
    • 85011043313 scopus 로고    scopus 로고
    • Over-encryption: Management of access control evolution on outsourced data
    • S.D.Vimercati, S.Foresti, S.Jajodia, et al. Over-encryption: Management of access control evolution on outsourced data[C]. Proc. of VLDB, 2007, pp123-134
    • (2007) Proc. of VLDB , pp. 123-134
    • Vimercati, S.D.1    Foresti, S.2    Jajodia, S.3
  • 14
    • 0015769886 scopus 로고
    • Approximation algorithm for combinatorial problems
    • D.Johnson. Approximation algorithm for combinatorial problems[C]. Proc. of STOC, 1973, pp38-49
    • (1973) Proc. of STOC , pp. 38-49
    • Johnson, D.1
  • 16
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S.Pohlig and M.Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance[J]. IEEE transactions on Information Theory, 1978, 24: 106-110
    • (1978) IEEE transactions on Information Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.