메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Managing and accessing data in the cloud: Privacy risks and approaches

Author keywords

cloud; data protection; outsourced data; Privacy risks; private access

Indexed keywords

ACCESSING DATA; DATA OUTSOURCING; DATA PROTECTION; GRAND CHALLENGE; HIGH QUALITY; INFORMATION DISCLOSURE; OUTSOURCED DATA; PRIVACY PROBLEMS; PRIVACY RISKS; PRIVATE ACCESS; SENSITIVE INFORMATIONS;

EID: 84872068962     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2012.6378956     Document Type: Conference Paper
Times cited : (65)

References (50)
  • 1
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • Jun.
    • B. Fung, K. Wang, R. Chen, and P. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM CSUR, vol. 42, no. 4, pp. 14:1-14:53, Jun. 2010.
    • (2010) ACM CSUR , vol.42 , Issue.4
    • Fung, B.1    Wang, K.2    Chen, R.3    Yu, P.4
  • 4
  • 10
    • 56349121668 scopus 로고    scopus 로고
    • Private information: To reveal or not to reveal
    • Oct.
    • D. Yao, K. Frikken, M. Atallah, and R. Tamassia, "Private information: To reveal or not to reveal," ACM TISSEC, vol. 12, no. 1, pp. 1-27, Oct. 2008.
    • (2008) ACM TISSEC , vol.12 , Issue.1 , pp. 1-27
    • Yao, D.1    Frikken, K.2    Atallah, M.3    Tamassia, R.4
  • 12
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Nov.
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE TKDE, vol. 13, no. 6, pp. 1010-1027, Nov. 2001.
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 16
    • 84863769012 scopus 로고    scopus 로고
    • Querying schemas with access restrictions
    • Mar.
    • M. Benedikt, P. Bourhis, and C. Ley, "Querying schemas with access restrictions," Proc. of VLDB Endowment, vol. 5, no. 7, pp. 634-645, Mar. 2012.
    • (2012) Proc. of VLDB Endowment , vol.5 , Issue.7 , pp. 634-645
    • Benedikt, M.1    Bourhis, P.2    Ley, C.3
  • 20
    • 0142231580 scopus 로고    scopus 로고
    • Computing complete answers to queries in the presence of limited access patterns
    • Oct.
    • C. Li, "Computing complete answers to queries in the presence of limited access patterns," VLDB Journal, vol. 12, no. 3, pp. 211-227, Oct. 2003.
    • (2003) VLDB Journal , vol.12 , Issue.3 , pp. 211-227
    • Li, C.1
  • 24
    • 0037510581 scopus 로고    scopus 로고
    • Authentication, access control and intrusion detection
    • A. Tucker, Ed. CRC Press Inc.
    • R. Sandhu and P. Samarati, "Authentication, access control and intrusion detection," in CRC Handbook of Computer Science and Engineering, A. Tucker, Ed. CRC Press Inc., 1997, pp. 1929-1948.
    • (1997) CRC Handbook of Computer Science and Engineering , pp. 1929-1948
    • Sandhu, R.1    Samarati, P.2
  • 26
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the Web
    • P. Bonatti and P. Samarati, "A uniform framework for regulating service access and information release on the Web," JCS, vol. 10, no. 3, pp. 241-272, 2002.
    • (2002) JCS , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 27
    • 38949188899 scopus 로고    scopus 로고
    • The Traust authorization service
    • Feb.
    • A. Lee, M. Winslett, J. Basney, and V. Welch, "The Traust authorization service," ACM TISSEC, vol. 11, no. 1, pp. 1-3, Feb. 2008.
    • (2008) ACM TISSEC , vol.11 , Issue.1 , pp. 1-3
    • Lee, A.1    Winslett, M.2    Basney, J.3    Welch, V.4
  • 37
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • May
    • E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," ACM TOS, vol. 2, no. 2, pp. 107-138, May 2006.
    • (2006) ACM TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 42
    • 60349128962 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Jan.
    • M. Atallah, M. Blanton, N. Fazio, and K. Frikken, "Dynamic and efficient key management for access hierarchies," ACM TISSEC, vol. 12, no. 3, pp. 18:1-18:43, Jan. 2009.
    • (2009) ACM TISSEC , vol.12 , Issue.3
    • Atallah, M.1    Blanton, M.2    Fazio, N.3    Frikken, K.4
  • 49
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval
    • W. Gasarch, "A survey on private information retrieval," Bulletin of the EATCS, vol. 82, pp. 72-107, 2004.
    • (2004) Bulletin of the EATCS , vol.82 , pp. 72-107
    • Gasarch, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.