-
1
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Jun.
-
B. Fung, K. Wang, R. Chen, and P. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM CSUR, vol. 42, no. 4, pp. 14:1-14:53, Jun. 2010.
-
(2010)
ACM CSUR
, vol.42
, Issue.4
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
3
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient and private access to outsourced data," in Proc. of ICDCS, Minneapolis, MN, USA, Jun. 2011.
-
Proc. of ICDCS, Minneapolis, MN, USA, Jun. 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
4
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc of CCS, Alexandria, VA, USA, Oct. 2008.
-
Proc of CCS, Alexandria, VA, USA, Oct. 2008
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
5
-
-
78649257622
-
Minimizing disclosure of private information in credential-based interactions: A graph-based approach
-
C. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati, "Minimizing disclosure of private information in credential-based interactions: A graph-based approach," in Proc. of PASSAT, Minneapolis, MN, USA, Aug. 2010.
-
Proc. of PASSAT, Minneapolis, MN, USA, Aug. 2010
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
84868251115
-
Minimising disclosure of client information in credential-based interactions
-
-, "Minimising disclosure of client information in credential-based interactions," IJIPSI, vol. 1, no. 2/3, pp. 205-233, 2012.
-
(2012)
IJIPSI
, vol.1
, Issue.2-3
, pp. 205-233
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
78650214790
-
Supporting privacy preferences in credential-based interactions
-
-, "Supporting privacy preferences in credential-based interactions," in Proc. of WPES, Chicago, IL, USA, Oct. 2010.
-
Proc. of WPES, Chicago, IL, USA, Oct. 2010
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
25844481612
-
Optimizing cost-sensitive trust-negotiation protocols
-
W. Chen, L. Clarke, J. Kurose, and D. Towsley, "Optimizing cost-sensitive trust-negotiation protocols," in Proc. of INFOCOM, Miami, FL, USA, Mar. 2005.
-
Proc. of INFOCOM, Miami, FL, USA, Mar. 2005
-
-
Chen, W.1
Clarke, L.2
Kurose, J.3
Towsley, D.4
-
9
-
-
78649279105
-
Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations
-
P. Kärger, D. Olmedilla, and W.-T. Balke, "Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations," in Proc. of SDM, Auckland, New Zealand, Aug. 2008.
-
Proc. of SDM, Auckland, New Zealand, Aug. 2008
-
-
Kärger, P.1
Olmedilla, D.2
Balke, W.-T.3
-
10
-
-
56349121668
-
Private information: To reveal or not to reveal
-
Oct.
-
D. Yao, K. Frikken, M. Atallah, and R. Tamassia, "Private information: To reveal or not to reveal," ACM TISSEC, vol. 12, no. 1, pp. 1-27, Oct. 2008.
-
(2008)
ACM TISSEC
, vol.12
, Issue.1
, pp. 1-27
-
-
Yao, D.1
Frikken, K.2
Atallah, M.3
Tamassia, R.4
-
11
-
-
79960907469
-
K-Anonymity
-
T. Yu and S. Jajodia, Eds. Springer-Verlag
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "k-Anonymity," in Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, Eds. Springer-Verlag, 2007.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
12
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov.
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE TKDE, vol. 13, no. 6, pp. 1010-1027, Nov. 2001.
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
14
-
-
78049364161
-
Providing mobile users' anonymity in hybrid networks
-
C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Providing mobile users' anonymity in hybrid networks," in Proc. of ESORICS, Athens, Greece, Sep. 2010.
-
Proc. of ESORICS, Athens, Greece, Sep. 2010
-
-
Ardagna, C.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
15
-
-
85084162733
-
Hiding amongst the clouds: A proposal for cloud-based onion routing
-
N. Jones, M. Arye, J. Cesareo, and M. Freedman, "Hiding amongst the clouds: A proposal for cloud-based onion routing," in Proc. of FOCI, San Francisco, CA, USA, Aug. 2011.
-
Proc. of FOCI, San Francisco, CA, USA, Aug. 2011
-
-
Jones, N.1
Arye, M.2
Cesareo, J.3
Freedman, M.4
-
16
-
-
84863769012
-
Querying schemas with access restrictions
-
Mar.
-
M. Benedikt, P. Bourhis, and C. Ley, "Querying schemas with access restrictions," Proc. of VLDB Endowment, vol. 5, no. 7, pp. 634-645, Mar. 2012.
-
(2012)
Proc. of VLDB Endowment
, vol.5
, Issue.7
, pp. 634-645
-
-
Benedikt, M.1
Bourhis, P.2
Ley, C.3
-
17
-
-
52649085759
-
Querying data under access limitations
-
A. Calì and D. Martinenghi, "Querying data under access limitations," in Proc. of ICDE, Cancun, Mexico, Apr. 2008.
-
Proc. of ICDE, Cancun, Mexico, Apr. 2008
-
-
Calì, A.1
Martinenghi, D.2
-
18
-
-
70349300098
-
Assessing query privileges via safe and efficient permission composition
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Assessing query privileges via safe and efficient permission composition," in Proc. of CCS, Alexandria, VA, USA, Oct. 2008.
-
Proc. of CCS, Alexandria, VA, USA, Oct. 2008
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
19
-
-
51849155423
-
Controlled information sharing in collaborative distributed query processing
-
-, "Controlled information sharing in collaborative distributed query processing," in Proc. of ICDCS, Beijing, China, Jun. 2008.
-
Proc. of ICDCS, Beijing, China, Jun. 2008
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
20
-
-
0142231580
-
Computing complete answers to queries in the presence of limited access patterns
-
Oct.
-
C. Li, "Computing complete answers to queries in the presence of limited access patterns," VLDB Journal, vol. 12, no. 3, pp. 211-227, Oct. 2003.
-
(2003)
VLDB Journal
, vol.12
, Issue.3
, pp. 211-227
-
-
Li, C.1
-
21
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy-aware biometrics: Design and implementation of a multimodal verification system," in Proc. of ACSAC, Anaheim, CA, USA, Dec. 2008.
-
Proc. of ACSAC, Anaheim, CA, USA, Dec. 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
22
-
-
84872077464
-
Privacy in biometrics
-
N. Boulgouris, K. Plataniotis, and E. Micheli-Tzanakou, Eds. Wiley-IEEE Press
-
-, "Privacy in biometrics," in Biometrics: theory, methods, and applications, N. Boulgouris, K. Plataniotis, and E. Micheli-Tzanakou, Eds. Wiley-IEEE Press, 2009.
-
(2009)
Biometrics: Theory, Methods, and Applications
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
23
-
-
84927600695
-
Robust fingerprint detection for access control
-
M. Gamassi, V. Piuri, D. Sana, and F. Scotti, "Robust fingerprint detection for access control," in Proc. of RoboCare, Rome, Italy, May 2005.
-
Proc. of RoboCare, Rome, Italy, May 2005
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
24
-
-
0037510581
-
Authentication, access control and intrusion detection
-
A. Tucker, Ed. CRC Press Inc.
-
R. Sandhu and P. Samarati, "Authentication, access control and intrusion detection," in CRC Handbook of Computer Science and Engineering, A. Tucker, Ed. CRC Press Inc., 1997, pp. 1929-1948.
-
(1997)
CRC Handbook of Computer Science and Engineering
, pp. 1929-1948
-
-
Sandhu, R.1
Samarati, P.2
-
25
-
-
81455141558
-
Expressive and deployable access control in open web service applications
-
Apr-Jun.
-
C. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, and M. Verdicchio, "Expressive and deployable access control in open web service applications," IEEE TSC, vol. 4, no. 2, pp. 96-109, Apr-Jun. 2011.
-
(2011)
IEEE TSC
, vol.4
, Issue.2
, pp. 96-109
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
Verdicchio, M.6
-
26
-
-
0036311802
-
A uniform framework for regulating service access and information release on the Web
-
P. Bonatti and P. Samarati, "A uniform framework for regulating service access and information release on the Web," JCS, vol. 10, no. 3, pp. 241-272, 2002.
-
(2002)
JCS
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
27
-
-
38949188899
-
The Traust authorization service
-
Feb.
-
A. Lee, M. Winslett, J. Basney, and V. Welch, "The Traust authorization service," ACM TISSEC, vol. 11, no. 1, pp. 1-3, Feb. 2008.
-
(2008)
ACM TISSEC
, vol.11
, Issue.1
, pp. 1-3
-
-
Lee, A.1
Winslett, M.2
Basney, J.3
Welch, V.4
-
28
-
-
0013175080
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," in Proc. of EUROCRYPT, Innsbruck, Austria, May 2001.
-
Proc. of EUROCRYPT, Innsbruck, Austria, May 2001
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
29
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model." in Proc. of SIGMOD, Madison, WI, USA, Jun. 2002.
-
Proc. of SIGMOD, Madison, WI, USA, Jun. 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
30
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing confidentiality and efficiency in untrusted relational DBMSs," in Proc. of CCS, Washington, DC, USA, Oct. 2003.
-
Proc. of CCS, Washington, DC, USA, Oct. 2003
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
31
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
H. Wang and L. Lakshmanan, "Efficient secure query evaluation over encrypted XML databases," in Proc. of VLDB, Seoul, Korea, Sep. 2006.
-
Proc. of VLDB, Seoul, Korea, Sep. 2006
-
-
Wang, H.1
Lakshmanan, L.2
-
32
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, "Two can keep a secret: A distributed architecture for secure database services," in Proc. of CIDR, Asilomar, CA, USA, Jan. 2005.
-
Proc. of CIDR, Asilomar, CA, USA, Jan. 2005
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
33
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Fragmentation and encryption to enforce privacy in data storage," in Proc. of ESORICS, Germany, Sep. 2007.
-
Proc. of ESORICS, Germany, Sep. 2007
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
34
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
-, "Keep a few: Outsourcing data while maintaining confidentiality," in Proc. of ESORICS, Saint Malo, France, Sep. 2009.
-
Proc. of ESORICS, Saint Malo, France, Sep. 2009
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
35
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
-, "Fragmentation design for efficient query execution over sensitive distributed databases," in Proc. of ICDCS, Montreal, Quebec, Canada, Jun. 2009.
-
Proc. of ICDCS, Montreal, Quebec, Canada, Jun. 2009
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
36
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. of EUROCRYPT 2003, Warsaw, Poland, May 2003.
-
Proc. of EUROCRYPT 2003, Warsaw, Poland, May 2003
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
37
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
May
-
E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," ACM TOS, vol. 2, no. 2, pp. 107-138, May 2006.
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
38
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in Proc. of VLDB, Vienna, Austria, Sep. 2007.
-
Proc. of VLDB, Vienna, Austria, Sep. 2007
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
39
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
-, "A data outsourcing architecture combining cryptography and access control," in Proc. of CSAW, Fairfax, VA, USA, Nov. 2007.
-
Proc. of CSAW, Fairfax, VA, USA, Nov. 2007
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
40
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
Apr.
-
-, "Encryption policies for regulating access to outsourced data," ACM TODS, vol. 35, no. 2, pp. 12:1-12:46, Apr. 2010.
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
41
-
-
84863928276
-
Support for write privileges on outsourced data
-
-, "Support for write privileges on outsourced data," in Proc. of SEC, Heraklion, Crete, Greece, Jun. 2012.
-
Proc. of SEC, Heraklion, Crete, Greece, Jun. 2012
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
42
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Jan.
-
M. Atallah, M. Blanton, N. Fazio, and K. Frikken, "Dynamic and efficient key management for access hierarchies," ACM TISSEC, vol. 12, no. 3, pp. 18:1-18:43, Jan. 2009.
-
(2009)
ACM TISSEC
, vol.12
, Issue.3
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
43
-
-
33745798432
-
DSAC: Integrity for outsourced databases with signature aggregation and chaining
-
M. Narasimha and G. Tsudik, "DSAC: Integrity for outsourced databases with signature aggregation and chaining," in Proc. of CIKM, Bremen, Germany, Oct.-Nov. 2005.
-
Proc. of CIKM, Bremen, Germany, Oct.-Nov. 2005
-
-
Narasimha, M.1
Tsudik, G.2
-
44
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K. Tan, "Verifying completeness of relational query results in data publishing," in Proc. of SIGMOD, Baltimore, MA, USA, Jun. 2005.
-
Proc. of SIGMOD, Baltimore, MA, USA, Jun. 2005
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
45
-
-
70849087019
-
Authenticated join processing in outsourced databases
-
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis, "Authenticated join processing in outsourced databases," in Proc. of SIGMOD, Providence, RI, USA, Jun.-Jul. 2009.
-
Proc. of SIGMOD, Providence, RI, USA, Jun.-Jul. 2009
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
46
-
-
70349251911
-
Dual encryption for query integrity assurance
-
H. Wang, J. Yin, C. Perng, and P. Yu, "Dual encryption for query integrity assurance," in Proc. of CIKM, Napa Valley, CA, USA, Oct. 2008.
-
Proc. of CIKM, Napa Valley, CA, USA, Oct. 2008
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.4
-
47
-
-
84997556980
-
Integrity auditing of outsourced data
-
M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity auditing of outsourced data," in Proc. of VLDB, Vienna, Austria, Sep. 2007.
-
Proc. of VLDB, Vienna, Austria, Sep. 2007
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
48
-
-
43349091759
-
Providing freshness guarantees for outsourced databases
-
-, "Providing freshness guarantees for outsourced databases," in Proc. of EDBT, Nantes, France, Mar. 2008.
-
Proc. of EDBT, Nantes, France, Mar. 2008
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
49
-
-
21144442219
-
A survey on private information retrieval
-
W. Gasarch, "A survey on private information retrieval," Bulletin of the EATCS, vol. 82, pp. 72-107, 2004.
-
(2004)
Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
50
-
-
80053026532
-
Supporting concurrency in private data outsourcing
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Supporting concurrency in private data outsourcing," in Proc. of ESORICS, Leuven, Belgium, Sep. 2011.
-
Proc. of ESORICS, Leuven, Belgium, Sep. 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
|