메뉴 건너뛰기




Volumn , Issue , 2011, Pages 710-719

Efficient and private access to outsourced data

Author keywords

Access confidentiality; Content confidentiality; Pattern confidentiality; Private access; Shuffle index

Indexed keywords

ACCESS CONFIDENTIALITY; CONTENT CONFIDENTIALITY; PATTERN CONFIDENTIALITY; PRIVATE ACCESS; SHUFFLE INDEX;

EID: 80051865953     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2011.37     Document Type: Conference Paper
Times cited : (75)

References (13)
  • 1
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • Beijing, China, April
    • P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions, " in Proc. of ASIACCS, Beijing, China, April 2010.
    • (2010) Proc. of ASIACCS
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 3
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, USA, June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model, " in Proc. of SIGMOD, Madison, USA, June 2002.
    • (2002) Proc. of SIGMOD
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 4
    • 0003160114 scopus 로고    scopus 로고
    • Computationally private information retrieval (extended abstract)
    • El Paso, USA, May
    • B. Chor and N. Gilboa, "Computationally private information retrieval (extended abstract), " in Proc. of STOC, El Paso, USA, May 1997.
    • (1997) Proc. of STOC
    • Chor, B.1    Gilboa, N.2
  • 5
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval, " JACM, vol. 45, no. 6, pp. 965-981, 1998.
    • (1998) JACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 6
    • 85141026002 scopus 로고    scopus 로고
    • On the computational practicality of private information retrieval
    • San Diego, USA, February/March
    • R. Sion and B. Carbunar, "On the computational practicality of private information retrieval, " in Proc. NDSS, San Diego, USA, February/March 2007.
    • (2007) Proc. NDSS
    • Sion, R.1    Carbunar, B.2
  • 9
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandria, USA, October
    • P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage, " in Proc of CCS, Alexandria, USA, October 2008.
    • (2008) Proc of CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 10
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Genoa, Italy, June
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. of ICDCS, Genoa, Italy, June 2010.
    • (2010) Proc. of ICDCS
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 11
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Seoul, Korea, September
    • H. Wang and L. V. Lakshmanan, "Efficient secure query evaluation over encrypted XML databases, " in Proc. of VLDB, Seoul, Korea, September 2006.
    • (2006) Proc. of VLDB
    • Wang, H.1    Lakshmanan, L.V.2
  • 12
    • 33646382224 scopus 로고    scopus 로고
    • Hiding traversal of tree structured data from untrusted data stores
    • Porto, Portugal, April
    • P. Lin and K. S. Candan, "Hiding traversal of tree structured data from untrusted data stores, " in Proc. of WOSIS, Porto, Portugal, April 2004.
    • (2004) Proc. of WOSIS
    • Lin, P.1    Candan, K.S.2
  • 13
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs, " JACM, vol. 43, no. 3, pp. 431-473, 1996. (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.