-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, June
-
R. Agrawal, J. Kierman, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. of SIGMOD 2004, Paris, France, June 2004.
-
(2004)
Proc. of SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
January
-
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. ACM TISSEC, 12(3):18:1-18:43, January 2009.
-
(2009)
ACM TISSEC
, vol.12
, Issue.3
, pp. 181-1843
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
3
-
-
49149120168
-
A fuzzy approach to multimodal biometric continuous authentication
-
September
-
A. Azzini, S. Marrara, R. Sassi, and F. Scotti. A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making, 7(3):243-256, September 2008.
-
(2008)
Fuzzy Optimization and Decision Making
, vol.7
, Issue.3
, pp. 243-256
-
-
Azzini, A.1
Marrara, S.2
Sassi, R.3
Scotti, F.4
-
4
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Rome, Italy, September
-
M. Barni et al. Privacy-preserving fingercode authentication. In Proc. of MM&Sec 2010, Rome, Italy, September 2010.
-
(2010)
Proc. of MM&Sec 2010
-
-
Barni, M.1
-
5
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
DOI 10.1145/1053283.1053289
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM TISSEC, 8(1):119-152, February 2005. (Pubitemid 40479431)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Anaheim, CA, USA, December
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti. Privacy-aware biometrics: Design and implementation of a multimodal verification system. In Proc. of ACSAC 2008, Anaheim, CA, USA, December 2008.
-
(2008)
Proc. of ACSAC 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
7
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, October
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of CCS 2003, Washington, DC, USA, October 2003.
-
(2003)
Proc. of CCS 2003
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
April
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Encryption policies for regulating access to outsourced data. ACM TODS, 35(2):12:1-12:46, April 2010.
-
(2010)
ACM TODS
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
September
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Fragments and loose associations: Respecting privacy in data publishing. Proc. of the VLDB Endowment, 3(1):1370-1381, September 2010.
-
(2010)
Proc. of the VLDB Endowment
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
77954468586
-
Privacy of outsourced data
-
A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. De Capitani di Vimercati, editors Auerbach Publications (Taylor and Francis Group)
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati. Privacy of outsourced data. In A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. De Capitani di Vimercati, editors, Digital Privacy: Theory, Technologies and Practices. Auerbach Publications (Taylor and Francis Group), 2007.
-
(2007)
Digital Privacy: Theory, Technologies and Practices
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Samarati, P.4
-
11
-
-
4644223618
-
Accuracy and performance of biometric systems
-
Como, Italy, May
-
M. Gamassi, M. Lazzaroni, M. Misino, V. Piuri, D. Sana, and F. Scotti. Accuracy and performance of biometric systems. In Proc. of IMTC 2004, Como, Italy, May 2004.
-
(2004)
Proc. of IMTC 2004
-
-
Gamassi, M.1
Lazzaroni, M.2
Misino, M.3
Piuri, V.4
Sana, D.5
Scotti, F.6
-
12
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy, May
-
M. Gamassi, V. Piuri, D. Sana, and F. Scotti. Robust fingerprint detection for access control. In Proc. of RoboCare 2005, Rome, Italy, May 2005.
-
(2005)
Proc. of RoboCare 2005
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
14
-
-
84967222929
-
Ensuring the integrity of encrypted databases in the database as a service model
-
Estes Park, CO, USA, August
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database as a service model. In Proc. of DBSec 2003, Estes Park, CO, USA, August 2003.
-
(2003)
Proc. of DBSec 2003
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
15
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI, USA, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of SIGMOD 2002, Madison, WI, USA, June 2002.
-
(2002)
Proc. of SIGMOD 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
17
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, IL, USA, June
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proc. of SIGMOD 2006, Chicago, IL, USA, June 2006.
-
(2006)
Proc. of SIGMOD 2006
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
18
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany, September
-
G. Miklau and D. Suciu. Controlling access to published data using cryptography. In Proc. of VLDB 2003, Berlin, Germany, September 2003.
-
(2003)
Proc. of VLDB 2003
-
-
Miklau, G.1
Suciu, D.2
-
20
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China, April
-
P. Samarati and S. De Capitani di Vimercati. Data protection in outsourcing scenarios: Issues and directions. In Proc. of ASIACCS 2010, Beijing, China, April 2010.
-
(2010)
Proc. of ASIACCS 2010
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
21
-
-
67649643946
-
Designing secure indexes for encrypted databases
-
Storrs, CT, USA, August
-
E. Shmueli, R. Waisenberg, Y. Elovici, and E. Gudes. Designing secure indexes for encrypted databases. In Proc. of DBSec 2005, Storrs, CT, USA, August 2005.
-
(2005)
Proc. of DBSec 2005
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
24
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
Seoul, Korea, September
-
H. Wang and L. V. S. Lakshmanan. Efficient secure query evaluation over encrypted XML databases. In Proc. of VLDB 2006, Seoul, Korea, September 2006.
-
(2006)
Proc. of VLDB 2006
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
25
-
-
84997556980
-
Integrity auditing of outsourced data
-
Vienna, Austria, September
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proc. of VLDB 2007, Vienna, Austria, September 2007.
-
(2007)
Proc. of VLDB 2007
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
26
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA, USA, March
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proc. of INFOCOM 2010, San Diego, CA, USA, March 2010.
-
(2010)
Proc. of INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|