메뉴 건너뛰기




Volumn , Issue , 2013, Pages 94-98

On information leakage by indexes over data fragments

Author keywords

[No Author keywords available]

Indexed keywords

DATA FRAGMENTATION; DATA FRAGMENTS; EFFECTIVENESS AND EFFICIENCIES; INFORMATION LEAKAGE; QUERY EXECUTION;

EID: 84881438234     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2013.6547434     Document Type: Conference Paper
Times cited : (11)

References (16)
  • 1
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • Madison, WI, USA, Jun
    • H. Hacigumus, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model." in Proc. of SIGMOD, Madison, WI, USA, Jun. 2002.
    • (2002) Proc. of SIGMOD
    • Hacigumus, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 2
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • Beijing, China, Apr
    • P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. of ASIACCS, Beijing, China, Apr. 2010.
    • (2010) Proc. of ASIACCS
    • Samarati, P.1    De Capitani Di, V.S.2
  • 3
    • 34250651882 scopus 로고    scopus 로고
    • Two can keep a secret: A distributed architecture for secure database services
    • CA, USA, Jan
    • G. Aggarwal et al., "Two can keep a secret: A distributed architecture for secure database services," in Proc. of CIDR, Asilomar, CA, USA, Jan. 2005.
    • (2005) Proc. of CIDR, Asilomar
    • Aggarwal, G.1
  • 4
    • 77955210832 scopus 로고    scopus 로고
    • Combining fragmentation and encryption to protect privacy in data storage
    • Jul
    • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Combining fragmentation and encryption to protect privacy in data storage," ACM TISSEC, vol. 13, no. 3, pp. 22:1-22:33, Jul. 2010.
    • (2010) ACM TISSEC , vol.13 , Issue.3 , pp. 221-2233
    • Ciriani, V.1    De Capitani Di, V.S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 6
    • 84872233418 scopus 로고    scopus 로고
    • An index structure for private data outsourcing
    • Richmond, VA, USA, Jul
    • A. Steele and K. Frikken, "An index structure for private data outsourcing," in Proc. of DBSec, Richmond, VA, USA, Jul. 2011.
    • (2011) Proc. of DBSec
    • Steele, A.1    Frikken, K.2
  • 8
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Seoul, Korea, Sep
    • H. Wang and L. V. S. Lakshmanan, "Efficient secure query evaluation over encrypted XML databases," in Proc. of VLDB, Seoul, Korea, Sep. 2006.
    • (2006) Proc. of VLDB
    • Wang, H.1    Lakshmanan, L.V.S.2
  • 9
    • 0031208857 scopus 로고    scopus 로고
    • Fundamental study-perfect hashing
    • Aug
    • Z. J. Czech, G. Havas, and B. S. Majewski, "Fundamental study-perfect hashing," Theor. Comput. Science, vol. 182, no. 1, pp. 1-143, Aug. 1997.
    • (1997) Theor. Comput. Science , vol.182 , Issue.1 , pp. 1-143
    • Czech, Z.J.1    Havas, G.2    Majewski, B.S.3
  • 13
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • Jun
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, vol. 21, no. 3, pp. 333-358, Jun. 2012.
    • (2012) The VLDB Journal , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 14
    • 3142716056 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data
    • Paris, France, Jun
    • R. Agrawal, J. Kierman, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proc. of SIGMOD, Paris, France, Jun. 2004.
    • (2004) Proc. of SIGMOD
    • Agrawal, R.1    Kierman, J.2    Srikant, R.3    Xu, Y.4
  • 15
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE TPDS , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.