메뉴 건너뛰기




Volumn 6358 LNCS, Issue , 2010, Pages 70-86

Joining privately on outsourced data

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; SEMANTICS; SENSITIVE DATA;

EID: 78649863199     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15546-8_6     Document Type: Conference Paper
Times cited : (11)

References (42)
  • 3
  • 8
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422-426 (1970)
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 9
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Advances in Cryptology - EUROCRYPT 2004
    • Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004) (Pubitemid 38717023)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 11
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: ACNS (2005)
    • ACNS (2005)
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 15
    • 0031635768 scopus 로고    scopus 로고
    • Fuzzy queries in multimedia database systems
    • Fagin, R.: Fuzzy queries in multimedia database systems. In: Proceedings of the 17th PODS, pp. 1-10 (1998)
    • (1998) Proceedings of the 17th PODS , pp. 1-10
    • Fagin, R.1
  • 17
    • 70349279685 scopus 로고    scopus 로고
    • Technical report, Gartner Group/Dataquest
    • Gartner, Inc., Server Storage and RAID Worldwide. Technical report, Gartner Group/Dataquest (1999), http://www.gartner.com
    • (1999) Server Storage and RAID Worldwide
  • 18
    • 84989338883 scopus 로고    scopus 로고
    • Answering aggregation queries in a secure system model
    • Ge, T., Zdonik, S.B.: Answering aggregation queries in a secure system model. In: Very Large Databases (VLDB), pp. 519-530 (2007)
    • (2007) Very Large Databases (VLDB) , pp. 519-530
    • Ge, T.1    Zdonik, S.B.2
  • 19
    • 0033895101 scopus 로고    scopus 로고
    • PicToSeek: Combining color and shape invariant features for image retrieval
    • DOI 10.1109/83.817602
    • Gevers, T., Smeulders, A.W.M.: PicToSeek: Combining Color and Shape Invariant Features for Image Retrieval. IEEE Trans. on Image Processing 9(1), 102-119 (2000) (Pubitemid 30562088)
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.1 , pp. 102-119
    • Gevers, T.1    Smeulders, A.W.M.2
  • 20
    • 33244488406 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2003/216
    • Goh, E.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
    • (2003) Secure Indexes
    • Goh, E.1
  • 22
    • 33745120364 scopus 로고    scopus 로고
    • Secure Conjunctive Keyword Search over Encrypted Data
    • Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
    • Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004) (Pubitemid 38846729)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 28
    • 0030677524 scopus 로고    scopus 로고
    • A logical language for expressing authorizations
    • Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. IEEE S&P, 31-42 (1997)
    • (1997) IEEE S&P , pp. 31-42
    • Jajodia, S.1    Samarati, P.2    Subrahmanian, V.S.3
  • 31
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptology 14(4), 255-293 (2001)
    • (2001) J. Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 32
    • 78649827621 scopus 로고    scopus 로고
    • Grosof: A logic-based knowledge representation for authorization with delegation
    • Li, Feigenbaum, Grosof: A logic-based knowledge representation for authorization with delegation. In: PCSFW: Proceedings of the 12th CSFW (1999)
    • PCSFW: Proceedings of the 12th CSFW (1999)
    • Li, F.1
  • 36
    • 0010573970 scopus 로고
    • Access rights administration in role-based security systems
    • Nyanchama, M., Osborn, S.L.: Access rights administration in role-based security systems. In: Proceedings of the IFIP DBSec, pp. 37-56 (1994)
    • (1994) Proceedings of the IFIP DBSec , pp. 37-56
    • Nyanchama, M.1    Osborn, S.L.2
  • 37
    • 84882787643 scopus 로고    scopus 로고
    • Database security integration using role-based access control
    • Osborn, S.L.: Database security integration using role-based access control. In: Proceedings of the IFIP DBSec, pp. 245-258 (2000)
    • (2000) Proceedings of the IFIP DBSec , pp. 245-258
    • Osborn, S.L.1
  • 38
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223
    • Paillier, P.1
  • 40
    • 0027928797 scopus 로고
    • On five definitions of data integrity
    • Sandhu, R.S.: On five definitions of data integrity. In: Proceedings of the IFIP DBSec, pp. 257-267 (1993)
    • (1993) Proceedings of the IFIP DBSec , pp. 257-267
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.