-
1
-
-
84855612158
-
-
"AWS Solution Providers," http://aws.amazon.com/solutions/ solution-providers/, 2009.
-
(2009)
AWS Solution Providers
-
-
-
2
-
-
84855608651
-
-
"AWS Case Studies," http://aws.amazon.com/solutions/case- studies/, 2009.
-
(2009)
AWS Case Studies
-
-
-
3
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in ACM Conference on Computer and Communications Security, 2009, pp. 199-212.
-
ACM Conference on Computer and Communications Security, 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
4
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All your clouds are belong to us: security analysis of cloud management interfaces," in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 3-14.
-
(2011)
CCSW '11
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
8
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
9
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
Online. Available: citeseer.ist.psu.edu/hacigumus02executing.html
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," in Proceedings of the ACM SIGMOD international conference on Management of data, 2002, pp. 216-227. [Online]. Available: citeseer.ist.psu.edu/hacigumus02executing.html
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2002
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
10
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. of the 30th Int'l Conference on Very Large Databases VLDB, 2004, pp. 720-731.
-
Proc. Of the 30th Int'l Conference on Very Large Databases VLDB, 2004
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
11
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004, pp. 563-574.
-
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, 2004
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
12
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ser.
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ser. SOSP '11, 2011, pp. 85-100.
-
(2011)
SOSP '11
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
13
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing confidentiality and efficiency in untrusted relational dbmss," in ACM Conference on Computer and Communications Security, 2003, pp. 93-102.
-
ACM Conference on Computer and Communications Security, 2003
, pp. 93-102
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
26444482007
-
Designing secure indexes for encrypted databases
-
E. Shmueli, R. Waisenberg, Y. Elovici, and E. Gudes, "Designing secure indexes for encrypted databases," in Proceedings of the IFIP Conference on Database and Applications Security, 2005, pp. 54-68.
-
Proceedings of the IFIP Conference on Database and Applications Security, 2005
, pp. 54-68
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
15
-
-
34548786107
-
Fast, secure encryption for indexing in a column-oriented dbms
-
T. Ge and S. B. Zdonik, "Fast, secure encryption for indexing in a column-oriented dbms," in Proceedings of the International Conference on Data Engineering, 2007, pp. 676-685.
-
Proceedings of the International Conference on Data Engineering, 2007
, pp. 676-685
-
-
Ge, T.1
Zdonik, S.B.2
-
16
-
-
80052699824
-
A comprehensive framework for secure query processing on relational data in the cloud
-
Proceedings of the 8th VLDB international conference on Secure data management, ser. Berlin, Heidelberg: Springer-Verlag
-
S. Wang, D. Agrawal, and A. El Abbadi, "A comprehensive framework for secure query processing on relational data in the cloud," in Proceedings of the 8th VLDB international conference on Secure data management, ser. SDM'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 52-69.
-
(2011)
SDM'11
, pp. 52-69
-
-
Wang, S.1
Agrawal, D.2
El Abbadi, A.3
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology - EUROCRYPT '99, ser. Springer Berlin / Heidelberg
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - EUROCRYPT '99, ser. Lecture Notes in Computer Science, vol. 1592. Springer Berlin / Heidelberg, 1999, pp. 223-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
-, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, pp. 97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, pp. 97-105
-
-
Gentry, C.1
-
21
-
-
80955157888
-
Can homomorphic encryption be practical?
-
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
-
M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?" in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 113-124.
-
(2011)
CCSW '11
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
22
-
-
79959972183
-
TrustedDB: A trusted hardware based database with privacy and data confidentiality
-
Proceedings of the 2011 international conference on Management of data, ser.
-
S. Bajaj and R. Sion, "TrustedDB: a trusted hardware based database with privacy and data confidentiality," in Proceedings of the 2011 international conference on Management of data, ser. SIGMOD '11, 2011, pp. 205-216.
-
(2011)
SIGMOD '11
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
23
-
-
84855974342
-
Cloud data protection for the masses
-
D. Song, E. Shi, I. Fischer, and U. Shankar, "Cloud data protection for the masses," IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012.
-
(2012)
IEEE Computer
, vol.45
, Issue.1
, pp. 39-45
-
-
Song, D.1
Shi, E.2
Fischer, I.3
Shankar, U.4
-
24
-
-
84929445167
-
Towards trusted cloud computing
-
Proceedings of the 2009 conference on Hot topics in cloud computing, ser. Berkeley, CA, USA: USENIX Association
-
N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009.
-
(2009)
HotCloud'09
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
25
-
-
84881339185
-
Orthogonal security with cipherbase
-
A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan, "Orthogonal security with cipherbase," in CIDR.
-
CIDR
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Kaushik, R.4
Kossmann, D.5
Ramamurthy, R.6
Venkatesan, R.7
-
26
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
27
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
Proceedings of the twenty-second annual ACM symposium on Theory of computing, ser.
-
R. Ostrovsky, "Efficient computation on oblivious RAMs," in Proceedings of the twenty-second annual ACM symposium on Theory of computing, ser. STOC '90, 1990, pp. 514-523.
-
(1990)
STOC '90
, pp. 514-523
-
-
Ostrovsky, R.1
-
28
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky, "Replication is not needed: Single database, computationally-private information retrieval," in Proceedings of the Anuual Symposium on Foundations of Computer Science (FOCS), 1997, pp. 364-373.
-
Proceedings of the Anuual Symposium on Foundations of Computer Science (FOCS), 1997
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
33
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: practical access pattern privacy and correctness on untrusted storage," in ACM Conference on Computer and Communications Security, 2008, pp. 139-148.
-
ACM Conference on Computer and Communications Security, 2008
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
34
-
-
80955132243
-
Towards practical oblivious RAM
-
vol. abs/1106.3652
-
E. Stefanov, E. Shi, and D. Song, "Towards practical oblivious RAM," CoRR, vol. abs/1106.3652, 2011.
-
(2011)
CoRR
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
35
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient and private access to outsourced data," in Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, pp. 710-719.
-
Proc. Of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), June 2011
, pp. 710-719
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
36
-
-
77958461266
-
Generalizing pir for practical private retrieval of public data
-
Berlin, Heidelberg: Springer-Verlag
-
S. Wang, D. Agrawal, and A. E. Abbadi, "Generalizing pir for practical private retrieval of public data," in Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy (DBSec). Berlin, Heidelberg: Springer-Verlag, 2010, pp. 1-16.
-
(2010)
Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec)
, pp. 1-16
-
-
Wang, S.1
Agrawal, D.2
Abbadi, A.E.3
-
37
-
-
77955446650
-
Achieving efficient query privacy for location based services
-
F. G. Olumofin, P. K. Tysowski, I. Goldberg, and U. Hengartner, "Achieving efficient query privacy for location based services," in Privacy Enhancing Technologies, 2010, pp. 93-110.
-
(2010)
Privacy Enhancing Technologies
, pp. 93-110
-
-
Olumofin, F.G.1
Tysowski, P.K.2
Goldberg, I.3
Hengartner, U.4
-
39
-
-
84873119651
-
Secure and privacy-preserving data services in the cloud: A data centric view
-
D. Agrawal, A. El Abbadi, and S. Wang, "Secure and privacy-preserving data services in the cloud: A data centric view," Proceedings of the International Conference on Very Large Data Bases (PVLDB), vol. 5, no. 12, pp. 2028-2029, 2012.
-
(2012)
Proceedings of the International Conference on Very Large Data Bases (PVLDB)
, vol.5
, Issue.12
, pp. 2028-2029
-
-
Agrawal, D.1
El Abbadi, A.2
Wang, S.3
-
40
-
-
84857615138
-
Towards privacy preserving access control in the cloud
-
M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham, "Towards privacy preserving access control in the cloud," in CollaborateCom, 2011, pp. 172-180.
-
CollaborateCom, 2011
, pp. 172-180
-
-
Nabeel, M.1
Bertino, E.2
Kantarcioglu, M.3
Thuraisingham, B.M.4
-
41
-
-
79956318862
-
Enforcing end-to-end application security in the cloud (big ideas paper)
-
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, ser. Berlin, Heidelberg: Springer-Verlag
-
J. Bacon, D. Evans, D. M. Eyers, M. Migliavacca, P. Pietzuch, and B. Shand, "Enforcing end-to-end application security in the cloud (big ideas paper)," in Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, ser. Middleware '10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 293-312.
-
(2010)
Middleware '10
, pp. 293-312
-
-
Bacon, J.1
Evans, D.2
Eyers, D.M.3
Migliavacca, M.4
Pietzuch, P.5
Shand, B.6
|