메뉴 건너뛰기




Volumn , Issue , 2011, Pages 205-216

TrustedDB: A trusted hardware based database with privacy and data confidentiality

Author keywords

database; trusted hardware

Indexed keywords

COMPUTER HARDWARE; DATA PRIVACY; QUERY LANGUAGES; QUERY PROCESSING; REGULATORY COMPLIANCE;

EID: 79959972183     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1989323.1989346     Document Type: Conference Paper
Times cited : (104)

References (44)
  • 2
    • 79959933250 scopus 로고    scopus 로고
    • Online
    • The UBENCH Toolkit. Online at http://www.phystech.com/download/ubench. html.
    • The UBENCH Toolkit
  • 3
    • 84870460935 scopus 로고    scopus 로고
    • Online
    • TPC-H Benchmark. Online at http://www.tpc.org/tpch/.
    • TPC-H Benchmark
  • 8
    • 33749642794 scopus 로고    scopus 로고
    • Sovereign joins
    • Ling Liu, Andreas Reuter, Kyu-Young Whang, and Jianjun Zhang, editors, IEEE Computer Society
    • Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, and Yaping Li. Sovereign joins. In Ling Liu, Andreas Reuter, Kyu-Young Whang, and Jianjun Zhang, editors, ICDE, page 26. IEEE Computer Society, 2006.
    • (2006) ICDE , pp. 26
    • Agrawal, R.1    Asonov, D.2    Kantarcioglu, M.3    Li, Y.4
  • 9
    • 17444392883 scopus 로고    scopus 로고
    • Protecting Client Privacy with Trusted Computing at the Server
    • Apr
    • Alexander Iliev and Sean W Smith. Protecting Client Privacy with Trusted Computing at the Server. IEEE, Security and Privacy, 3(2), Apr 2005.
    • (2005) IEEE, Security and Privacy , vol.3 , Issue.2
    • Iliev, A.1    Smith, S.W.2
  • 18
    • 84881357010 scopus 로고    scopus 로고
    • Aggregation Queries in the Database-As-a-Service Model
    • Einar Mykletun and Gene Tsudik. Aggregation Queries in the Database-As-a-Service Model. Data and Applications Security, 4127, 2006.
    • (2006) Data and Applications Security , pp. 4127
    • Mykletun, E.1    Tsudik, G.2
  • 19
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Tal Rabin, editor, CRYPTO, Springer
    • Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Tal Rabin, editor, CRYPTO, volume 6223 of Lecture Notes in Computer Science, pages 465-482. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 22
    • 16644385952 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • Bala Iyer Hakan Hacigumus and Sharad Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advanced Applications, volume 2973, pages 633-650, 2004.
    • (2004) Database Systems for Advanced Applications , vol.2973 , pp. 633-650
    • Iyer, B.1    Hacigumus, H.2    Mehrotra, S.3
  • 28
    • 26444442384 scopus 로고    scopus 로고
    • Security issues in querying encrypted data
    • Sushil Jajodia and Duminda Wijesekera, editors, DBSec, Springer
    • Murat Kantarcioglu and Chris Clifton. Security issues in querying encrypted data. In Sushil Jajodia and Duminda Wijesekera, editors, DBSec, volume 3654 of Lecture Notes in Computer Science, pages 325-337. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3654 , pp. 325-337
    • Kantarcioglu, M.1    Clifton, C.2
  • 33
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
    • Proceedings of EuroCrypt, 1999
    • Paillier, P.1
  • 38
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM SYSTEMS JOURNAL, 40(3), 2001.
    • (2001) IBM SYSTEMS JOURNAL , vol.40 , Issue.3
    • Smith, S.W.1    Safford, D.2
  • 41
    • 79959981273 scopus 로고    scopus 로고
    • The case for determinism in database systems
    • Alexander Thomson and Daniel J. Abadi. The case for determinism in database systems. PVLDB, 3(1):70-80, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 70-80
    • Thomson, A.1    Abadi, D.J.2
  • 43
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • Henri Gilbert, editor, EUROCRYPT, Springer
    • Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the integers. In Henri Gilbert, editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 24-43. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6110 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4
  • 44
    • 79959944746 scopus 로고    scopus 로고
    • Technical Report UCB/EECS-2008-158, EECS Department, University of California Berkeley, Dec
    • Yaping Li. Privacy Preserving Joins on Secure Coprocessors. Technical Report UCB/EECS-2008-158, EECS Department, University of California Berkeley, Dec 2008. http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-158.html.
    • (2008) Privacy Preserving Joins on Secure Coprocessors
    • Li, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.