-
1
-
-
0036204131
-
Providing database as a service
-
In
-
Hacigümüs H, Mehrotra S, Iyer B, "Providing database as a service", In Proceedings of the 18th International Conference on Data Engineering (ICDE 2002), pp. 29-38, 2002.
-
(2002)
Proceedings of the 18th International Conference on Data Engineering (ICDE 2002)
, pp. 29-38
-
-
Hacigümüs, H.1
Mehrotra, S.2
Iyer, B.3
-
2
-
-
66349137145
-
Privacy preservation in database applications: A survey
-
Zhou Shui-Geng, Li Feng, Tao Yu-Fe., Xiao Xiao-Kui, "Privacy preservation in database applications: a survey", Chinese Journal of Computers, vol. 32, no. 5, pp. 847-861, 2009.
-
(2009)
Chinese Journal of Computers
, vol.32
, Issue.5
, pp. 847-861
-
-
Shui-Geng, Z.1
Feng, L.2
Yu-Fe, T.3
Xiao-Kui, X.4
-
3
-
-
77953238222
-
Database as a service - security and privacy preserving
-
Tian Xiu-Xia, Wang Xiao-Ling, Gao Ming, Zhou Ao-Ying, "Database as a service - security and privacy preserving", Journal of Software, vol. 21, no. 5, pp. 991-1006, 2010.
-
(2010)
Journal of Software
, vol.21
, Issue.5
, pp. 991-1006
-
-
Xiu-Xia, T.1
Xiao-Ling, W.2
Ming, G.3
Ao-Ying, Z.4
-
4
-
-
84928251914
-
Blind custodians: A database service architecture that supports privacy without encryption
-
Motro, A., Parisi-Presicce, F, "Blind custodians: a database service architecture that supports privacy without encryption", Lecture Notes in Computer Science, 3654, pp. 338-352, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3654
, pp. 338-352
-
-
Motro, A.1
Parisi-Presicce, F.2
-
5
-
-
67650555385
-
A data privacy preservation method based on lossy decomposition
-
Liu Yu-Bao, Huang Zhi-Lan, Ada Wai-Chee-Fu, Yin Jian, "A data privacy preservation method based on lossy decomposition", Journal of Computer Research and Development, vol. 46, no. 7, pp. 1217-1225, 2009.
-
(2009)
Journal of Computer Research and Development
, vol.46
, Issue.7
, pp. 1217-1225
-
-
Yu-Bao, L.1
Zhi-Lan, H.2
Wai-Chee-Fu, A.3
Jian, Y.4
-
6
-
-
77749241774
-
A database encryption method based on information dissociation and association
-
Li Xian-Wei, Liu Guo-Hua, Yuan Ying, Ma Hui-Dong, "A database encryption method based on information dissociation and association", Computer Engineering & Science, vol. 29, no.10, pp. 54-56, 60, 2007.
-
(2007)
Computer Engineering & Science
, vol.29
, Issue.10
-
-
Xian-Wei, L.1
Guo-Hua, L.2
Ying, Y.3
Hui-Dong, M.4
-
7
-
-
77952768140
-
Correlation hiding by independence masking
-
In
-
Tao Yufei, Pei Jian, Li Jiexing, Xiao Xiaokui, Yi Ke, Xing Zhengzheng, "Correlation hiding by independence masking", In Proceedings of the 26th International Conference on Data Engineering (ICDE 2010), pp. 964-967, 2010.
-
(2010)
Proceedings of the 26th International Conference on Data Engineering (ICDE 2010)
, pp. 964-967
-
-
Yufei, T.1
Jian, P.2
Jiexing, L.3
Xiaokui, X.4
Ke, Y.5
Zhengzheng, X.6
-
8
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Ciriani V, Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P, "Fragmentation and encryption to enforce privacy in data storage", Lecture Notes in Computer Science, 4734, pp. 171-186, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4734
, pp. 171-186
-
-
Ciriani, V.1
Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
70350370035
-
Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients
-
Ciriani V, Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P, "Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients", Lecture Notes in Computer Science, 5645, pp. 225-239, 2009
-
(2009)
Lecture Notes in Computer Science
, vol.5645
, pp. 225-239
-
-
Ciriani, V.1
Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
71749102261
-
A privacy manager for cloud computing
-
Pearson S, Shen Y, Mowbray M, "A privacy manager for cloud computing", Lecture Notes in Computer Science, 5931, pp. 90-106, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5931
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
13
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
In, Autonomic and Secure Computing (DASC)
-
Itani W, Kayssi A, Chehab A, "Privacy as a service: privacy-aware data storage and processing in cloud computing architectures", In Proceedings of 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), pp. 711-716, 2009.
-
(2009)
Proceedings of 8th IEEE International Symposium on Dependable
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
15
-
-
77749344712
-
Data Privacy Preserving Mechanism based on Tenant Customization for SaaS
-
In
-
K. Zhang, Y. Shi, Q. Li, and J. Bian,"Data Privacy Preserving Mechanism based on Tenant Customization for SaaS", In: Proceedings of 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), pp. 599-603, 2009.
-
(2009)
Proceedings of 2009 International Conference on Multimedia Information Networking and Security (MINES 2009)
, pp. 599-603
-
-
Zhang, K.1
Shi, Y.2
Li, Q.3
Bian, J.4
-
16
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
In
-
C. Wang, Q. Wang, K. Ren, and W. Lou,"Ensuring data storage security in cloud computing", In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1-9, 2009.
-
(2009)
17th IEEE International Workshop on Quality of Service (IWQoS 2009)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
17
-
-
70350389843
-
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
-
In: Backes, M., Ning, P. (eds), LNCS
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,"Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", In: Backes, M., Ning, P. (eds) Computer Society - ESORICS 2009. LNCS, vol. 5789, pp. 355-370, 2009.
-
(2009)
Computer Society - ESORICS 2009
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
18
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
In
-
K. Bowers, A. Juels, and A. Oprea,"HAIL: a high-availability and integrity layer for cloud storage", In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), pp. 187-198, 2009.
-
(2009)
Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
19
-
-
77953238222
-
Database as a Service - Security and Privacy Preserving
-
X. Tian, X. Wang, M. Gao, and A. Zhou. Database as a Service - Security and Privacy Preserving. Journal of Software, 2010, 21(5): pp. 991-1006, 2010.
-
(2010)
Journal of Software
, vol.21
, Issue.5
, pp. 991-1006
-
-
Tian, X.1
Wang, X.2
Gao, M.3
Zhou, A.4
-
20
-
-
84997556980
-
Integrity Auditing of Outsourced Data
-
In
-
M. Xie, H. Wang, J. Yin, and X. Meng,"Integrity Auditing of Outsourced Data", In: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007), pp.782-793, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007)
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
21
-
-
70349251911
-
Dual encryption for query integrity assurance
-
In
-
H. Wang, J. Yin, C. Perng, and P. Yu, "Dual encryption for query integrity assurance", In: Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), pp. 863-872, 2008.
-
(2008)
Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008)
, pp. 863-872
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.4
-
23
-
-
74049102823
-
Provable data possession at untrusted stores
-
In
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,"Provable data possession at untrusted stores", In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007), pp. 598-609, 2007.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
|