메뉴 건너뛰기




Volumn , Issue , 2013, Pages 155-166

Compromising privacy in precise query protocols

Author keywords

Algorithms; H.2.7 Database Management : Database Administration Security, integrity, and protection; H.3.3 Information Storage and Retrieval : Information Search and Retrieval Query formulation; Security

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; DIGITAL STORAGE; QUERY PROCESSING;

EID: 84876791111     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2452376.2452397     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 3
    • 4243997063 scopus 로고    scopus 로고
    • Permutation entropy: A natural complexity measure for time series
    • Apr
    • C. Bandt and B. Pompe. Permutation entropy: A natural complexity measure for time series. Phys. Rev. Lett., 88:174102, Apr 2002.
    • (2002) Phys. Rev. Lett. , vol.88 , pp. 174102
    • Bandt, C.1    Pompe, B.2
  • 5
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. TCC, pages 535-554, 2007.
    • (2007) Proc. TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 6
    • 0017216776 scopus 로고
    • Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms
    • K. S. Booth and G. S. Lueker. Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms. J. Comput. System Sci., 13(3):335-379, 1976.
    • (1976) J. Comput. System Sci. , vol.13 , Issue.3 , pp. 335-379
    • Booth, K.S.1    Lueker, G.S.2
  • 8
    • 79952779059 scopus 로고    scopus 로고
    • RASP: Efficient multidimensional range query on attack-resilient encrypted databases
    • K. Chen, R. Kavuluru, and S. Guo. RASP: efficient multidimensional range query on attack-resilient encrypted databases. In Proc. ACM CODASPY, pages 249-260, 2011.
    • (2011) Proc. ACM CODASPY , pp. 249-260
    • Chen, K.1    Kavuluru, R.2    Guo, S.3
  • 12
    • 85172049273 scopus 로고    scopus 로고
    • Security limitations of using secret sharing for data outsourcing
    • J. Dautrich and C. Ravishankar. Security limitations of using secret sharing for data outsourcing. In Proc. DBSec, 2012.
    • Proc. DBSec, 2012
    • Dautrich, J.1    Ravishankar, C.2
  • 14
    • 0342917767 scopus 로고
    • Solution of the value-independent knapsack problem by partitioning
    • B. Faaland. Solution of the value-independent knapsack problem by partitioning. Operations Research, 21(1):332-337, 1973.
    • (1973) Operations Research , vol.21 , Issue.1 , pp. 332-337
    • Faaland, B.1
  • 15
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. ACM SIGMOD, pages 216-227, 2002.
    • (2002) Proc. ACM SIGMOD , pp. 216-227
    • Hacigümüş, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 17
    • 26444442384 scopus 로고    scopus 로고
    • Security issues in querying encrypted data
    • M. Kantarcioglu and C. Clifton. Security issues in querying encrypted data. In Proc. DBSec, pages 325-337, 2005.
    • (2005) Proc. DBSec , pp. 325-337
    • Kantarcioglu, M.1    Clifton, C.2
  • 18
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proc. EUROCRYPT, pages 146-162, 2008.
    • (2008) Proc. EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 19
    • 26444524370 scopus 로고    scopus 로고
    • Efficiency and security trade-off in supporting range queries on encrypted databases
    • J. Li and E. Omiecinski. Efficiency and security trade-off in supporting range queries on encrypted databases. In Proc. DBSec, pages 69-83, 2005.
    • (2005) Proc. DBSec , pp. 69-83
    • Li, J.1    Omiecinski, E.2
  • 20
    • 84921683893 scopus 로고    scopus 로고
    • Authorized private keyword search over encrypted personal health records in cloud computing
    • M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted personal health records in cloud computing. In Proc. ICDCS, 2011.
    • Proc. ICDCS, 2011
    • Li, M.1    Yu, S.2    Cao, N.3    Lou, W.4
  • 21
    • 84876798589 scopus 로고    scopus 로고
    • Hiding tree structured data and queries from untrusted data stores
    • P. Lin and K. Candan. Hiding tree structured data and queries from untrusted data stores. Information Systems Security, 14(4):10, 2005.
    • (2005) Information Systems Security , vol.14 , Issue.4 , pp. 10
    • Lin, P.1    Candan, K.2
  • 23
    • 33746748166 scopus 로고    scopus 로고
    • Aggregation queries in the database-as-a-service model
    • E. Mykletun and G. Tsudik. Aggregation queries in the database-as-a-service model. In Proc. DBSec, pages 89-103, 2006.
    • (2006) Proc. DBSec , pp. 89-103
    • Mykletun, E.1    Tsudik, G.2
  • 24
    • 85172058163 scopus 로고    scopus 로고
    • Revisiting the computational practicality of private information retrieval
    • F. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Proc. FC, 2011.
    • Proc. FC, 2011
    • Olumofin, F.1    Goldberg, I.2
  • 25
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • P. Samarati and S. De Capitani di Vimercati. Data protection in outsourcing scenarios: issues and directions. In Proc. ASIACCS, pages 1-14, 2010.
    • (2010) Proc. ASIACCS , pp. 1-14
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 26
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Proc. TCC, pages 457-473, 2009.
    • (2009) Proc. TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 29
    • 43749097236 scopus 로고    scopus 로고
    • A secure multi-dimensional partition based index in DAS. In
    • J. Wang and X. Du. A secure multi-dimensional partition based index in DAS. In Proc. APWeb, pages 319-330, 2008.
    • (2008) Proc. APWeb , pp. 319-330
    • Wang, J.1    Du, X.2
  • 30
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-preserving queries on encrypted data
    • Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving queries on encrypted data. In Proc. ESORICS, pages 479-495, 2006.
    • (2006) Proc. ESORICS , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.