-
2
-
-
79959933250
-
-
Online
-
The UBENCH Toolkit. Online at http://www.phystech.com/download/ubench. html.
-
The UBENCH Toolkit
-
-
-
3
-
-
84870460935
-
-
Online
-
TPC-H Benchmark. Online at http://www.tpc.org/tpch/.
-
TPC-H Benchmark
-
-
-
7
-
-
79960024309
-
Cloud databases: What's new?
-
Daniel Abadi, Michael J. Carey, Surajit Chaudhuri, Hector Garcia-Molina, Jignesh M. Patel, and Raghu Ramakrishnan. Cloud databases: What's new? PVLDB, 3(2):1657, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.2
, pp. 1657
-
-
Abadi, D.1
Carey, M.J.2
Chaudhuri, S.3
Garcia-Molina, H.4
Patel, J.M.5
Ramakrishnan, R.6
-
8
-
-
33749642794
-
Sovereign joins
-
Ling Liu, Andreas Reuter, Kyu-Young Whang, and Jianjun Zhang, editors, IEEE Computer Society
-
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, and Yaping Li. Sovereign joins. In Ling Liu, Andreas Reuter, Kyu-Young Whang, and Jianjun Zhang, editors, ICDE, page 26. IEEE Computer Society, 2006.
-
(2006)
ICDE
, pp. 26
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
9
-
-
17444392883
-
Protecting Client Privacy with Trusted Computing at the Server
-
Apr
-
Alexander Iliev and Sean W Smith. Protecting Client Privacy with Trusted Computing at the Server. IEEE, Security and Privacy, 3(2), Apr 2005.
-
(2005)
IEEE, Security and Privacy
, vol.3
, Issue.2
-
-
Iliev, A.1
Smith, S.W.2
-
11
-
-
34247369863
-
Using secure coprocessors for privacy preserving collaborative data mining and analysis
-
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Goldman, Bianca Zadrozny, Chid Apte, Vamsavardhana R. Chillakuru and Marysabel del Carpio. Using secure coprocessors for privacy preserving collaborative data mining and analysis. In Proceedings of the 2nd international workshop on Data management on new hardware, 2006.
-
Proceedings of the 2nd International Workshop on Data Management on New Hardware, 2006
-
-
Bhattacharjee, B.1
Abe, N.2
Goldman, K.3
Zadrozny, B.4
Apte, C.5
Chillakuru, V.R.6
Carpio, M.D.7
-
14
-
-
78650219479
-
On securing untrusted clouds with cryptography
-
New York, NY, USA, ACM
-
Yao Chen and Radu Sion. On securing untrusted clouds with cryptography. In WPES '10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pages 109-114, New York, NY, USA, 2010. ACM.
-
(2010)
WPES '10: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 109-114
-
-
Chen, Y.1
Sion, R.2
-
18
-
-
84881357010
-
Aggregation Queries in the Database-As-a-Service Model
-
Einar Mykletun and Gene Tsudik. Aggregation Queries in the Database-As-a-Service Model. Data and Applications Security, 4127, 2006.
-
(2006)
Data and Applications Security
, pp. 4127
-
-
Mykletun, E.1
Tsudik, G.2
-
19
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Tal Rabin, editor, CRYPTO, Springer
-
Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Tal Rabin, editor, CRYPTO, volume 6223 of Lecture Notes in Computer Science, pages 465-482. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
22
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Bala Iyer Hakan Hacigumus and Sharad Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advanced Applications, volume 2973, pages 633-650, 2004.
-
(2004)
Database Systems for Advanced Applications
, vol.2973
, pp. 633-650
-
-
Iyer, B.1
Hacigumus, H.2
Mehrotra, S.3
-
27
-
-
0035474388
-
-
IEEE
-
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer and Leendert van Doorn. Building the IBM 4758 Secure Coprocessor. IEEE, 34(10), 2001.
-
(2001)
Building the IBM 4758 Secure Coprocessor
, vol.34
, pp. 10
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
-
28
-
-
26444442384
-
Security issues in querying encrypted data
-
Sushil Jajodia and Duminda Wijesekera, editors, DBSec, Springer
-
Murat Kantarcioglu and Chris Clifton. Security issues in querying encrypted data. In Sushil Jajodia and Duminda Wijesekera, editors, DBSec, volume 3654 of Lecture Notes in Computer Science, pages 325-337. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3654
, pp. 325-337
-
-
Kantarcioglu, M.1
Clifton, C.2
-
31
-
-
33846956427
-
Incorporating a secure coprocessor in the database-as-a-service model
-
Washington, DC, USA, IEEE Computer Society
-
Einar Mykletun and Gene Tsudik. Incorporating a secure coprocessor in the database-as-a-service model. In IWIA '05: Proceedings of the Innovative Architecture on Future Generation High-Performance Processors and Systems, pages 38-44, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
IWIA '05: Proceedings of the Innovative Architecture on Future Generation High-Performance Processors and Systems
, pp. 38-44
-
-
Mykletun, E.1
Tsudik, G.2
-
32
-
-
35448952234
-
GhostDB: Querying Visible and Hidden Data Without Leaks
-
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral and Dennis Shasha. GhostDB: Querying Visible and Hidden Data Without Leaks. In Proceedings of the ACM SIGMOD international conference on Management of data, 2007.
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Pucheral, P.4
Shasha, D.5
-
33
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
-
Proceedings of EuroCrypt, 1999
-
-
Paillier, P.1
-
36
-
-
33749642794
-
Sovereign Joins
-
IEEE Computer Society
-
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, Yaping Li. Sovereign Joins. In Proceedings of the 22nd International Conference on Data Engineering, page 26. IEEE Computer Society, 2006.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering
, pp. 26
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
38
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM SYSTEMS JOURNAL, 40(3), 2001.
-
(2001)
IBM SYSTEMS JOURNAL
, vol.40
, Issue.3
-
-
Smith, S.W.1
Safford, D.2
-
40
-
-
73649141347
-
Mapreduce and parallel dbmss: Friends or foes?
-
Michael Stonebraker, Daniel J. Abadi, David J. DeWitt, Samuel Madden, Erik Paulson, Andrew Pavlo, and Alexander Rasin. Mapreduce and parallel dbmss: friends or foes? Commun. ACM, 53(1):64-71, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.1
, pp. 64-71
-
-
Stonebraker, M.1
Abadi, D.J.2
DeWitt, D.J.3
Madden, S.4
Paulson, E.5
Pavlo, A.6
Rasin, A.7
-
41
-
-
79959981273
-
The case for determinism in database systems
-
Alexander Thomson and Daniel J. Abadi. The case for determinism in database systems. PVLDB, 3(1):70-80, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 70-80
-
-
Thomson, A.1
Abadi, D.J.2
-
43
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Henri Gilbert, editor, EUROCRYPT, Springer
-
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the integers. In Henri Gilbert, editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 24-43. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
44
-
-
79959944746
-
-
Technical Report UCB/EECS-2008-158, EECS Department, University of California Berkeley, Dec
-
Yaping Li. Privacy Preserving Joins on Secure Coprocessors. Technical Report UCB/EECS-2008-158, EECS Department, University of California Berkeley, Dec 2008. http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-158.html.
-
(2008)
Privacy Preserving Joins on Secure Coprocessors
-
-
Li, Y.1
|