-
1
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Madison, WI, USA, Jun
-
H. Hacigumus, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model." in Proc. of SIGMOD, Madison, WI, USA, Jun. 2002.
-
(2002)
Proc. of SIGMOD
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
2
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China, Apr
-
P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. of ASIACCS, Beijing, China, Apr. 2010.
-
(2010)
Proc. of ASIACCS
-
-
Samarati, P.1
De Capitani Di, V.S.2
-
3
-
-
34250651882
-
Two can keep a secret: A distributed architecture for secure database services
-
CA, USA, Jan
-
G. Aggarwal et al., "Two can keep a secret: A distributed architecture for secure database services," in Proc. of CIDR, Asilomar, CA, USA, Jan. 2005.
-
(2005)
Proc. of CIDR, Asilomar
-
-
Aggarwal, G.1
-
4
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Jul
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Combining fragmentation and encryption to protect privacy in data storage," ACM TISSEC, vol. 13, no. 3, pp. 22:1-22:33, Jul. 2010.
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
, pp. 221-2233
-
-
Ciriani, V.1
De Capitani Di, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
5
-
-
79959237939
-
Selective data outsourcing for enforcing privacy
-
"Selective data outsourcing for enforcing privacy," JCS, vol. 19, no. 3, pp. 531-566, 2011.
-
(2011)
JCS
, vol.19
, Issue.3
, pp. 531-566
-
-
Ciriani, V.1
De Capitani Di, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
84872233418
-
An index structure for private data outsourcing
-
Richmond, VA, USA, Jul
-
A. Steele and K. Frikken, "An index structure for private data outsourcing," in Proc. of DBSec, Richmond, VA, USA, Jul. 2011.
-
(2011)
Proc. of DBSec
-
-
Steele, A.1
Frikken, K.2
-
7
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
Feb
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and assessing inference exposure in encrypted databases," ACM TISSEC, vol. 8, no. 1, pp. 119-152, Feb. 2005.
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani, S.3
Vimercati, D.4
Jajodia, S.5
Paraboschi, S.6
Samarati, P.7
-
8
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
Seoul, Korea, Sep
-
H. Wang and L. V. S. Lakshmanan, "Efficient secure query evaluation over encrypted XML databases," in Proc. of VLDB, Seoul, Korea, Sep. 2006.
-
(2006)
Proc. of VLDB
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
9
-
-
0031208857
-
Fundamental study-perfect hashing
-
Aug
-
Z. J. Czech, G. Havas, and B. S. Majewski, "Fundamental study-perfect hashing," Theor. Comput. Science, vol. 182, no. 1, pp. 1-143, Aug. 1997.
-
(1997)
Theor. Comput. Science
, vol.182
, Issue.1
, pp. 1-143
-
-
Czech, Z.J.1
Havas, G.2
Majewski, B.S.3
-
10
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, USA, Jun
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient and private access to outsourced data," in Proc. of ICDCS, Minneapolis, MN, USA, Jun. 2011.
-
(2011)
Proc. of ICDCS
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
11
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
Apr
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Encryption policies for regulating access to outsourced data," ACM TODS, vol. 35, no. 2, pp. 12:1-12:46, Apr. 2010.
-
(2010)
ACM TODS
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, Oct
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing confidentiality and efficiency in untrusted relational DBMSs," in Proc. of CCS, Washington, DC, USA, Oct. 2003.
-
(2003)
Proc. of CCS
-
-
Damiani, E.1
De Capitani, S.2
Vimercati, D.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
13
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
Jun
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, vol. 21, no. 3, pp. 333-358, Jun. 2012.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
14
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, Jun
-
R. Agrawal, J. Kierman, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proc. of SIGMOD, Paris, France, Jun. 2004.
-
(2004)
Proc. of SIGMOD
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
15
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
16
-
-
80053026532
-
Supporting concurrency in private data outsourcing
-
Leuven, Belgium, Sep
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Supporting concurrency in private data outsourcing," in Proc. of ESORICS, Leuven, Belgium, Sep. 2011.
-
(2011)
Proc. of ESORICS
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
|