-
2
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "Above the clouds: A Berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
4
-
-
0003902428
-
-
3rd Edition, Pearson Education, New Delhi
-
Stallings, W., "Cryptography and Network Security", 3rd Edition, Pearson Education, New Delhi, 2003, p8.
-
(2003)
Cryptography and Network Security
, pp. 8
-
-
Stallings, W.1
-
5
-
-
85013815928
-
-
2nd Edition, Elsevier, New Delhi
-
Kamber, et al., "Data Mining Concepts and Techniques", 2nd Edition, Elsevier, New Delhi, 2009, p12-13
-
(2009)
Data Mining Concepts and Techniques
, pp. 12-13
-
-
Kamber1
-
6
-
-
1142303699
-
Information Sharing across Private Databases
-
R. Agrawal, A.V. Evfimievski, and R. Srikant, "Information Sharing across Private Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '03), pp. 86-97, 2003.
-
(2003)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '03)
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.V.2
Srikant, R.3
-
7
-
-
3142716056
-
Order-Preserving Encryption for Numeric Data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order-Preserving Encryption for Numeric Data," Proc. ACM Int'l Conf. Management of Data (SIGMOD '04), pp. 563-574, 2004.
-
(2004)
Proc. ACM Int'l Conf. Management of Data (SIGMOD '04)
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
38149068986
-
Deterministic and Efficiently Searchable Encryption
-
M. Bellare, A. Boldyreva, and A. O'Neill,"Deterministic and Efficiently Searchable Encryption," Advances in Cryptology (CRYPTO '07), pp. 535-552, 2007.
-
(2007)
Advances in Cryptology (CRYPTO '07)
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
10
-
-
33746437508
-
Privacy Preserving Data Mining
-
Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," J. Cryptology, vol. 15, no. 3, pp. 177-206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
11
-
-
35448932873
-
Privacy Preserving Schema and Data Matching
-
M. Scannapieco, I. Figotin, E. Bertino, and A.K. Elmagarmid, "Privacy Preserving Schema and Data Matching," Proc. ACM Int'l Conf. Management of Data (SIGMOD '07), pp. 653-664, 2007.
-
(2007)
Proc. ACM Int'l Conf. Management of Data (SIGMOD '07)
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
12
-
-
34548264581
-
Preserving Data Privacy for Outsourcing Data Aggregation Services
-
L. Xiong, S. Chitti, and L. Liu,"Preserving Data Privacy for Outsourcing Data Aggregation Services," ACM Trans. Internet Technology, vol. 7, no. 3, pp. 17-45, 2007.
-
(2007)
ACM Trans. Internet Technology
, vol.7
, Issue.3
, pp. 17-45
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
-
13
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Advances in Cryptology (EUROCRYPT '04), pp. 506-522, 2004.
-
(2004)
Advances in Cryptology (EUROCRYPT '04)
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
14
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
D.X. Song, D. Wagner, and A. Perrig,"Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security and Privacy (S&P '00), pp. 44-55, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy (S&P '00)
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
15
-
-
78650554194
-
A Privacy Preserving Repository for Data Integration across Data Sharing Services
-
July-September
-
Yau, Stephan S., et. al, "A Privacy Preserving Repository for Data Integration across Data Sharing Services", IEEE Transactions on Services Computing, Vol 1, No-3, July-September 2008
-
(2008)
IEEE Transactions on Services Computing
, vol.1
, Issue.3
-
-
Yau, S.S.1
-
16
-
-
78650554194
-
A Privacy Preserving Repository for Data Integration across Data Sharing Services
-
July-September
-
Yau, Stephan S., et. al, "A Privacy Preserving Repository for Data Integration across Data Sharing Services", IEEE Transactions on Services Computing, Vol 1, No-3, July-September 2008
-
(2008)
IEEE Transactions on Services Computing
, vol.1
, Issue.3
-
-
Yau, S.S.1
-
17
-
-
0030156987
-
Query Caching and Optimization in Distributed Mediator Systems
-
S. Adali, K.S. Candan, Y. Papakonstantinou, and V.S. Subrahmanian, "Query Caching and Optimization in Distributed Mediator Systems," Proc. ACM Int'l Conf. Management of Data (SIGMOD '96), pp. 137-148, 1996.
-
(1996)
Proc. ACM Int'l Conf. Management of Data (SIGMOD '96)
, pp. 137-148
-
-
Adali, S.1
Candan, K.S.2
Papakonstantinou, Y.3
Subrahmanian, V.S.4
-
18
-
-
0030168050
-
Query Reformulation for Dynamic Information Integration
-
Y. Arens, C.A. Knoblock, and W. Shen,"Query Reformulation for Dynamic Information Integration," J. Intelligent Information Systems, vol. 6, no. 2, pp. 99-130, 1996.
-
(1996)
J. Intelligent Information Systems
, vol.6
, Issue.2
, pp. 99-130
-
-
Arens, Y.1
Knoblock, C.A.2
Shen, W.3
-
19
-
-
0345870315
-
An Adaptive Query Execution System for Data Integration
-
Z.G. Ives, D. Florescu, M. Friedman, A.Y. Levy, and D.S. Weld,"An Adaptive Query Execution System for Data Integration," Proc. ACM Int'l Conf. Management of Data (SIGMOD '99), pp. 299- 310, 1999.
-
(1999)
Proc. ACM Int'l Conf. Management of Data (SIGMOD '99)
, pp. 299-310
-
-
Ives, Z.G.1
Florescu, D.2
Friedman, M.3
Levy, A.Y.4
Weld, D.S.5
-
20
-
-
48349086541
-
Security Policy Enforcement in BPEL-Defined CollaborativeBusiness Processes
-
K.P. Fischer, U. Bleimann, W. Fuhrmann, and S.M. Furnell, "Security Policy Enforcement in BPEL-Defined CollaborativeBusiness Processes," Proc. 23rd Int'l Conf. Data Eng. Workshop, pp. 685-694, 2007.
-
(2007)
Proc. 23rd Int'l Conf. Data Eng. Workshop
, pp. 685-694
-
-
Fischer, K.P.1
Bleimann, U.2
Fuhrmann, W.3
Furnell, S.M.4
-
21
-
-
0002988773
-
Querying Heterogeneous Information Sources Using Source Descriptions
-
A.Y. Levy, A. Rajaraman, and J.J. Ordille, "Querying Heterogeneous Information Sources Using Source Descriptions," Proc. 22th Int'l Conf. Very Large Data Bases (VLDB '96), pp. 251-262, 1996.
-
(1996)
Proc. 22th Int'l Conf. Very Large Data Bases (VLDB '96)
, pp. 251-262
-
-
Levy, A.Y.1
Rajaraman, A.2
Ordille, J.J.3
-
22
-
-
35448999370
-
Effective Keyword-Based Selection of Relational Databases
-
B. Yu, G. Li, K.R. Sollins, and A.K.H. Tung,"Effective Keyword-Based Selection of Relational Databases," Proc. ACM Int'l Conf. Management of Data (SIGMOD '07), pp. 139-150, 2007.
-
(2007)
Proc. ACM Int'l Conf. Management of Data (SIGMOD '07)
, pp. 139-150
-
-
Yu, B.1
Li, G.2
Sollins, K.R.3
Tung, A.K.H.4
-
23
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Shucheng Yu., Cong Wang†, Kui Ren , and Wenjing Lou , "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE INFOCOM 2010 Proceedings
-
IEEE INFOCOM 2010 Proceedings
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|