-
1
-
-
84881118536
-
-
IBM 4765 PCIe Cryptographic Coprocessor. Online at
-
IBM 4765 PCIe Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/.
-
-
-
-
2
-
-
84881098968
-
-
TPC-H. Online at
-
TPC-H. Online at http://www.tpc.org/tpch/.
-
-
-
-
3
-
-
84881102215
-
Trusteddb: A trusted hardware based database with privacy, and data confidentiality
-
PrePrints
-
S. Bajaj, and R. Sion. Trusteddb: A trusted hardware based database with privacy, and data confidentiality. IEEE Transactions on Knowledge, and Data Engineering, 99(PrePrints):1, 2013.
-
(2013)
IEEE Transactions on Knowledge, and Data Engineering
, vol.99
, pp. 1
-
-
Bajaj, S.1
Sion, R.2
-
4
-
-
84881096857
-
Secure data outsourcing
-
Springer US, L. Liu, and M. T. Özsu, editors
-
B. Carminati. Secure data outsourcing. In L. Liu, and M. T. Özsu, editors, Encyclopedia of Database Systems. Springer US, 2009.
-
(2009)
Encyclopedia of Database Systems
-
-
Carminati, B.1
-
5
-
-
78650219479
-
On securing untrusted clouds with cryptography
-
E. Al-Shaer, and K. B. Frikken, editors, ACM
-
Y. Chen, and R. Sion. On securing untrusted clouds with cryptography. In E. Al-Shaer, and K. B. Frikken, editors, WPES, pages 109-114. ACM, 2010.
-
(2010)
WPES
, pp. 109-114
-
-
Chen, Y.1
Sion, R.2
-
6
-
-
84881113576
-
To cloud or not to cloud? musings on costs, and viability
-
Y. Chen, and R. Sion. To cloud or not to cloud? musings on costs, and viability. In SOCC. ACM, 2011.
-
(2011)
SOCC. ACM
-
-
Chen, Y.1
Sion, R.2
-
7
-
-
52649097332
-
Authenticating multi-dimensional query results in data publishing
-
W. Cheng, H. Pang,, and K. lee Tan. Authenticating multi-dimensional query results in data publishing. In In DBSec, 2006.
-
(2006)
DBSec
-
-
Cheng, W.1
Pang, H.2
Lee Tan, K.3
-
8
-
-
0038274733
-
-
P. Devanbu, M. Gertz, C. Martel,, and S. G. Stubblebine. Authentic data publication over the internet. pages 291 - 314, 2003.
-
(2003)
Authentic data publication over the internet
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
9
-
-
33746748166
-
Aggregation Queries in the Database-As-a-Service Model
-
Einar Mykletun, and Gene Tsudik. Aggregation Queries in the Database-As-a-Service Model. Data, and Applications Security, 4127, 2006.
-
(2006)
Data, and Applications Security
, vol.4127
-
-
Mykletun, E.1
Tsudik, G.2
-
10
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists, and commutative hashing
-
IEEE Computer Society Press
-
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists, and commutative hashing. In DISCEX, pages 68 - 82. IEEE Computer Society Press, 2001.
-
(2001)
DISCEX
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
11
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
H. Hacigumus, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In DASFAA, volume 2973, pages 633-650, 2004.
-
(2004)
DASFAA
, vol.2973
, pp. 633-650
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
12
-
-
78650610346
-
Verifying spatial queries using voronoi neighbors
-
ACM
-
L. Hu, W.-S. Ku, S. Bakiras, and C. Shahabi. Verifying spatial queries using voronoi neighbors. In Proceedings of GIS, pages 350-359. ACM, 2010.
-
(2010)
Proceedings of GIS
, pp. 350-359
-
-
Hu, L.1
Ku, W.-S.2
Bakiras, S.3
Shahabi, C.4
-
13
-
-
84881108104
-
-
IBM 4764 PCI-X, 4765 PCIe Cryptographic Coprocessors. Online at
-
IBM 4764 PCI-X, 4765 PCIe Cryptographic Coprocessors. Online at http://www-03.ibm.com/security/cryptocards/.
-
-
-
-
14
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, and Leendert van Doorn. Building the IBM 4758 Secure Coprocessor. IEEE, 34(10): 2001.
-
(2001)
IEEE
, vol.34
, Issue.10
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
-
15
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
ACM
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proceedings of SIGMOD, pages 121 - 132. ACM, 2006.
-
(2006)
Proceedings of SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
16
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
Dec, 32:1-32:35
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur., 13(4):32:1-32:35, Dec. 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur
, vol.13
, Issue.4
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
17
-
-
83055179387
-
Authentication of location-based skyline queries
-
ACM
-
X. Lin, J. Xu, and H. Hu. Authentication of location-based skyline queries. In Proceedings of CIKM, pages 1583-1588. ACM, 2011.
-
(2011)
Proceedings of CIKM
, pp. 1583-1588
-
-
Lin, X.1
Xu, J.2
Hu, H.3
-
18
-
-
21044438930
-
A general model for authenticated data structures
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authenticated data structures. Algorithmica, Volume 39 Issue 1, pages 21 - 41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
19
-
-
84969346266
-
A certified digital signature
-
Springer-Verlag New York, Inc.
-
R. C. Merkle. A certified digital signature. In Proceedings on Advances in cryptology, pages 218-238. Springer-Verlag New York, Inc., 1989.
-
(1989)
Proceedings on Advances in cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
20
-
-
33746668803
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In ESORICS, 2004.
-
(2004)
ESORICS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
21
-
-
33747176236
-
Authentication, and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication, and integrity in outsourced databases. ACM TOS, Volume 2 Issue 2, pages 107 - 138, 2006.
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
22
-
-
33745798432
-
Dsac: integrity for outsourced databases with signature aggregation, and chaining
-
M. Narasimha, and G. Tsudik. Dsac: integrity for outsourced databases with signature aggregation, and chaining. In Proceedings of CIKM. ACM, 2005.
-
(2005)
Proceedings of CIKM. ACM
-
-
Narasimha, M.1
Tsudik, G.2
-
23
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
ACM
-
H. Pang, A. Jain, K. Ramamritham, and K. Tan. Verifying completeness of relational query results in data publishing. In Proceedings of SIGMOD, pages 407 - 418. ACM, 2005.
-
(2005)
Proceedings of SIGMOD
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
24
-
-
2442590644
-
Authenticating query results in edge computing
-
IEEE Computer Society
-
H. Pang, and K.-L. Tan. Authenticating query results in edge computing. In Proceedings of ICDE, page 560. IEEE Computer Society, 2004.
-
(2004)
Proceedings of ICDE
, pp. 560
-
-
Pang, H.1
Tan, K.-L.2
-
25
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
H. Pang, J. Zhang, and K. Mouratidi. Scalable verification for outsourced dynamic databases. Proceedings of the VLDB Endowment, Volume 2 Issue 1, pages 802 - 813, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidi, K.3
-
26
-
-
67649657667
-
Separating authentication from query execution in outsourced databases
-
IEEE Computer Society
-
S. Papadopoulos, D. Papadias, W. Cheng, and K.-L. Tan. Separating authentication from query execution in outsourced databases. In Proceedings of ICDE, pages 1148 - 1151. IEEE Computer Society, 2009.
-
(2009)
Proceedings of ICDE
, pp. 1148-1151
-
-
Papadopoulos, S.1
Papadias, D.2
Cheng, W.3
Tan, K.-L.4
-
27
-
-
84924359730
-
Cloud performance benchmark series, network performance: Amazon ec2
-
Online at
-
S. Sanghrajka, N. Mahajan, and R. Sion. Cloud performance benchmark series, network performance: Amazon ec2. Online at www.cloudcommons.org.
-
-
-
Sanghrajka, S.1
Mahajan, N.2
Sion, R.3
-
28
-
-
43349086016
-
Ensuring correctness over untrusted private database
-
ACM
-
S. Singh, and S. Prabhakar. Ensuring correctness over untrusted private database. In Proceedings of EDBT, pages 476 - 486. ACM, 2008.
-
(2008)
Proceedings of EDBT
, pp. 476-486
-
-
Singh, S.1
Prabhakar, S.2
-
29
-
-
84956968842
-
Outbound authentication for programmable secure coprocessors
-
Springer-Verlag
-
S. W. Smith. Outbound authentication for programmable secure coprocessors. In Proceedings of ESORICS, pages 72-89. Springer-Verlag, 2002.
-
(2002)
Proceedings of ESORICS
, pp. 72-89
-
-
Smith, S.W.1
-
30
-
-
79959972183
-
TrustedDB: A Trusted Hardware based Database with Privacy, and Data Confidentiality
-
ACM
-
Sumeet Bajaj, and Radu Sion. TrustedDB: A Trusted Hardware based Database with Privacy, and Data Confidentiality. In Proceedings of SIGMOD, pages 205-216. ACM, 2011.
-
(2011)
Proceedings of SIGMOD
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
31
-
-
84997556980
-
Integrity auditing of outsourced data
-
VLDB Endowment
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proceedings of VLDB, pages 782 - 793. VLDB Endowment, 2007.
-
(2007)
Proceedings of VLDB
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
32
-
-
70849087019
-
Authenticated join processing in outsourced databases
-
ACM
-
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. Authenticated join processing in outsourced databases. In Proceedings of SIGMOD, pages 5 - 18. ACM, 2009.
-
(2009)
Proceedings of SIGMOD
, pp. 5-18
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
34
-
-
83255176095
-
Authentication of range query results in mapreduce environments
-
ACM
-
Z. Yang, S. Gao, J. Xu, and B. Choi. Authentication of range query results in mapreduce environments. In Proceedings of CloudDB, pages 25-32. ACM, 2011.
-
(2011)
Proceedings of CloudDB
, pp. 25-32
-
-
Yang, Z.1
Gao, S.2
Xu, J.3
Choi, B.4
-
35
-
-
84881111603
-
Efficient query integrity for outsourced dynamic databases
-
Q. Zheng, S. Xu, and G. Ateniese. Efficient query integrity for outsourced dynamic databases. 2012.
-
(2012)
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
|