-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of SIGMOD 2004, Paris, France (June 2004)
-
Proc. of SIGMOD 2004, Paris, France (June 2004)
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84863962007
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proc. of CCS 2005, Alexandria, VA, USA (November 2005)
-
Proc. of CCS 2005, Alexandria, VA, USA (November 2005)
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
3
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
5
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
84976482712
-
Fine grained access control for SOAP e-services
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Fine grained access control for SOAP e-services. In: Proc. of WWW 2001, Hong Kong, China (May 2001)
-
Proc. of WWW 2001, Hong Kong, China (May 2001)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
7
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: A data outsourcing architecture combining cryptography and access control. In: Proc. of CSAW 2007, Fairfax, VA, USA (November 2007)
-
Proc. of CSAW 2007, Fairfax, VA, USA (November 2007)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1-12:46 (2010)
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
84927600695
-
Robust fingerprint detection for access control
-
Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare 2005, Rome, Italy (May 2005)
-
Proc. of RoboCare 2005, Rome, Italy (May 2005)
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the SIGMOD 2002, Madison, WI, USA (June 2002)
-
Proc. of the SIGMOD 2002, Madison, WI, USA (June 2002)
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
11
-
-
84969346266
-
A Certified Digital Signature
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
13
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS 2(2), 107-138 (2006)
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
14
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: Proc. of SIGMOD 2005, Baltimore, MA, USA (June 2005)
-
Proc. of SIGMOD 2005, Baltimore, MA, USA (June 2005)
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
15
-
-
84863924554
-
Privacy enhanced access control for outsourced data sharing
-
Raykova, M., Zhao, H., Bellovin, S.: Privacy enhanced access control for outsourced data sharing. In: Proc. of FC 2012, Bonaire (February-March 2012)
-
Proc. of FC 2012, Bonaire (February-March 2012)
-
-
Raykova, M.1
Zhao, H.2
Bellovin, S.3
-
18
-
-
84997556980
-
Integrity auditing of outsourced data
-
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of VLDB 2007, Vienna, Austria (September 2007)
-
Proc. of VLDB 2007, Vienna, Austria (September 2007)
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
19
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of INFOCOM 2010, San Diego, CA, USA (March 2010)
-
Proc. of INFOCOM 2010, San Diego, CA, USA (March 2010)
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
20
-
-
79956336417
-
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems
-
Bao, F., Weng, J. (eds.) ISPEC 2011. Springer, Heidelberg
-
Zhao, F., Nishide, T., Sakurai, K.: Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 83-97. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6672
, pp. 83-97
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
|