-
1
-
-
0036204131
-
Providing database as a service
-
26 Feb. 1 March 2002, Los Alamitos, CA, USA
-
H. Hacigumus, B. Iyer, and S. Mehrotra, "Providing database as a service", in Proceedings 18th International Conference on Data Engineering, 26 Feb. 1 March 2002, Los Alamitos, CA, USA, 2002, pp. 29-38.
-
(2002)
Proceedings 18th International Conference on Data Engineering
, pp. 29-38
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
3
-
-
37849008829
-
Provably-secure schemes for basic query support in outsourced databases
-
G. Amanatidis, A. Boldyreva, and A. ONeill, "Provably-secure schemes for basic query support in outsourced databases", Data and Applications Security XXI, pp. 14-30, 2007.
-
(2007)
Data and Applications Security XXI
, pp. 14-30
-
-
Amanatidis, G.1
Boldyreva, A.2
ONeill, A.3
-
4
-
-
67649645974
-
Efficiency and security trade-off in supporting range queries on encrypted databases
-
J. Li and E. Omiecinski, "Efficiency and security trade-off in supporting range queries on encrypted databases", Data and Applications Security XIX, pp. 925-925, 2005.
-
(2005)
Data and Applications Security XIX
, pp. 925-925
-
-
Li, J.1
Omiecinski, E.2
-
5
-
-
84997556980
-
Integrity auditing of outsourced data
-
VLDB Endowment
-
M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity auditing of outsourced data", in Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007, pp. 782-793.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
6
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
sp, p. 0044
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data", sp, p. 0044, 2000.
-
(2000)
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
7
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
H. Pang, J. Zhang, and K. Mouratidis, "Scalable verification for outsourced dynamic databases", Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
8
-
-
77957769385
-
Integrated privacy protection and access control over outsourced database services
-
W. B. Yonghong Yu, "Integrated privacy protection and access control over outsourced database services", Journal of Computational Information Systems, vol. 6, no. 8, pp. 2767-2777, 2010.
-
(2010)
Journal of Computational Information Systems
, vol.6
, Issue.8
, pp. 2767-2777
-
-
Yu, W.B.Y.1
-
9
-
-
0035474388
-
Building the ibm 4758 secure coprocessor
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. Van Doom, S. Smith, and S. Weingart, "Building the ibm 4758 secure coprocessor", Computer, pp. 57-66, 2001.
-
(2001)
Computer
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doom, L.5
Smith, S.6
Weingart, S.7
-
10
-
-
33947109885
-
Chip-secured data access: Confidential data on untrusted servers
-
L. Bouganim and P. Pucheral, "Chip-secured data access: Confidential data on untrusted servers", 2002, pp.131-142.
-
(2002)
, pp. 131-142
-
-
Bouganim, L.1
Pucheral, P.2
-
11
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
13
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
ACM
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing sql over encrypted data in the database-service-provider model", in Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002, pp. 216-227.
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
|