메뉴 건너뛰기




Volumn 8, Issue 6, 2012, Pages 2387-2400

Executing SQL with preserving privacy on outsourced database using secure coprocessors

Author keywords

Data privacy; Outsourced database; Searching on encrypted data; Secure coprocessor

Indexed keywords

CO-PROCESSORS; DATABASE QUERIES; ENCRYPTED DATABASE; LOW OVERHEAD; PRIVACY PRESERVING; SEARCHING ON ENCRYPTED DATA; SECURE COPROCESSOR; SECURITY NOTION; SERVICE PROVIDER;

EID: 84861470705     PISSN: 15539105     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (13)
  • 4
    • 67649645974 scopus 로고    scopus 로고
    • Efficiency and security trade-off in supporting range queries on encrypted databases
    • J. Li and E. Omiecinski, "Efficiency and security trade-off in supporting range queries on encrypted databases", Data and Applications Security XIX, pp. 925-925, 2005.
    • (2005) Data and Applications Security XIX , pp. 925-925
    • Li, J.1    Omiecinski, E.2
  • 6
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • sp, p. 0044
    • D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data", sp, p. 0044, 2000.
    • (2000)
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 7
    • 77952757644 scopus 로고    scopus 로고
    • Scalable verification for outsourced dynamic databases
    • H. Pang, J. Zhang, and K. Mouratidis, "Scalable verification for outsourced dynamic databases", Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
    • (2009) Proceedings of the VLDB Endowment , vol.2 , Issue.1 , pp. 802-813
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 8
    • 77957769385 scopus 로고    scopus 로고
    • Integrated privacy protection and access control over outsourced database services
    • W. B. Yonghong Yu, "Integrated privacy protection and access control over outsourced database services", Journal of Computational Information Systems, vol. 6, no. 8, pp. 2767-2777, 2010.
    • (2010) Journal of Computational Information Systems , vol.6 , Issue.8 , pp. 2767-2777
    • Yu, W.B.Y.1
  • 10
    • 33947109885 scopus 로고    scopus 로고
    • Chip-secured data access: Confidential data on untrusted servers
    • L. Bouganim and P. Pucheral, "Chip-secured data access: Confidential data on untrusted servers", 2002, pp.131-142.
    • (2002) , pp. 131-142
    • Bouganim, L.1    Pucheral, P.2
  • 11
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.