-
1
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199-212. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
2
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
ACM, New York
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216-227. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
3
-
-
85065578926
-
A privacy-preserving index for range queries
-
Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004
-
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004. VLDB Endowment, vol. 30, pp. 720-731 (2004)
-
(2004)
VLDB Endowment
, vol.30
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
4
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM, New York
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD 2004, pp. 563-574. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD 2004
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
34548786107
-
Fast, secure encryption for indexing in a column-oriented dbms
-
Ge, T., Zdonik, S.B.: Fast, secure encryption for indexing in a column-oriented dbms. In: ICDE, pp. 676-685 (2007)
-
(2007)
ICDE
, pp. 676-685
-
-
Ge, T.1
Zdonik, S.B.2
-
6
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
ACM, New York
-
Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 93-102. ACM, New York (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
26444482007
-
Designing secure indexes for encrypted databases
-
Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: IFIPWorking Conference on Database Security, pp. 54-68 (2005)
-
(2005)
IFIPWorking Conference on Database Security
, pp. 54-68
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
9
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of The ACM 45(6), 965-981 (1998)
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
11
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS, pp. 139-148 (2008)
-
(2008)
CCS
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
12
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of The ACM 36(2), 335-348 (1989)
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
13
-
-
13244269971
-
Note: Correction to the 1997 tutorial on reed-solomon coding
-
Plank, J.S., Ding, Y.: Note: Correction to the 1997 tutorial on reed-solomon coding. Softw., Pract. Exper. 35(2), 189-194 (2005)
-
(2005)
Softw., Pract. Exper.
, vol.35
, Issue.2
, pp. 189-194
-
-
Plank, J.S.1
Ding, Y.2
-
14
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
ACM, New York
-
Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 187-198. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
15
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th IEEE International Workshop in Quality of Service, pp. 1-9 (2009)
-
(2009)
Proceedings of the 17th IEEE International Workshop in Quality of Service
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
18
-
-
0018480749
-
Ubiquitous b-tree
-
Comer, D.: Ubiquitous b-tree. ACM Comput. Surv. 11(2), 121-137 (1979)
-
(1979)
ACM Comput. Surv.
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
19
-
-
33749610153
-
Privacy preserving query processing using third parties
-
IEEE Computer Society, Washington, DC, USA
-
Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 27. IEEE Computer Society, Washington, DC, USA (2006)
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006
, pp. 27
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
20
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007
-
Ge, T., Zdonik, S.: Answering aggregation queries in a secure system model. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007. VLDB Endowment, pp. 519-530 (2007)
-
(2007)
VLDB Endowment
, pp. 519-530
-
-
Ge, T.1
Zdonik, S.2
-
21
-
-
80051865953
-
Efficient and private access to outsourced data
-
to appear
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: ICDCS (to appear 2011)
-
(2011)
ICDCS
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
22
-
-
77954899284
-
Racs: A case for cloud storage diversity
-
ACM, New York
-
Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010, pp. 229-240. ACM, New York (2010)
-
(2010)
Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010
, pp. 229-240
-
-
Abu-Libdeh, H.1
Princehouse, L.2
Weatherspoon, H.3
-
23
-
-
80052741278
-
-
Technical report, Department of Computer Science, UCSB
-
Wang, S., Agrawal, D., Abbadi, A.E.: A comprehensive framework for secure query processing on relational data in the cloud. Technical report, Department of Computer Science, UCSB (2010)
-
(2010)
A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud
-
-
Wang, S.1
Agrawal, D.2
Abbadi, A.E.3
-
24
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Advances in Cryptology - CRYPTO '96
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
25
-
-
84893821498
-
Efficient secure query evaluation over encrypted xml databases
-
Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006
-
Wang, H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted xml databases. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006. VLDB Endowment, pp. 127-138 (2006)
-
(2006)
VLDB Endowment
, pp. 127-138
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
29
-
-
80052748487
-
-
www
-
www: Tpc-w, http://www.tpc.org/tpcw
-
Tpc-w
-
-
|