-
1
-
-
70449469756
-
Data center evolution: A tutorial on state of the art, issues, and challenges
-
Kant K. Data center evolution: A tutorial on state of the art, issues, and challenges. Comput. Netw. 2009, 53(17):2939-2965.
-
(2009)
Comput. Netw.
, vol.53
, Issue.17
, pp. 2939-2965
-
-
Kant, K.1
-
2
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
IEEE Computer Society, Anaheim, CA
-
Cimato S., Gamassi M., Piuri V., Sassi R., Scotti F. Privacy-aware biometrics: Design and implementation of a multimodal verification system. Proc. of ACSAC 2008 December 2008, IEEE Computer Society, Anaheim, CA.
-
(2008)
Proc. of ACSAC 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
3
-
-
4644223618
-
Accuracy and performance of biometric systems
-
IEEE Computer Society, Como, Italy, S. Demidenko, R. Ottoboni, D. Petri, V. Piuri, D. Chong, T. Weng (Eds.)
-
Gamassi M., Lazzaroni M., Misino M., Piuri V., Sana D., Scotti F. Accuracy and performance of biometric systems. Proc. of IMTC 2004 2004, IEEE Computer Society, Como, Italy. S. Demidenko, R. Ottoboni, D. Petri, V. Piuri, D. Chong, T. Weng (Eds.).
-
(2004)
Proc. of IMTC 2004
-
-
Gamassi, M.1
Lazzaroni, M.2
Misino, M.3
Piuri, V.4
Sana, D.5
Scotti, F.6
-
6
-
-
79951510303
-
-
ACM, S. Jajodia, V. Atluri, T. Jaeger (Eds.)
-
Damiani E., De Capitani di Vimercati S., Jajodia S., Paraboschi S., Samarati P. Balancing confidentiality and efficiency in untrusted relational DBMSs October 2003, ACM. S. Jajodia, V. Atluri, T. Jaeger (Eds.).
-
(2003)
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
35048853519
-
-
IEEE Computer Society, D. Georgakopoulos, R. Agrawal, K. Dittrich (Eds.)
-
Hacigümüs H., Iyer B., Mehrotra S. Providing database as a service February 2002, IEEE Computer Society. D. Georgakopoulos, R. Agrawal, K. Dittrich (Eds.).
-
(2002)
Providing database as a service
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
8
-
-
34250658685
-
-
ACM, M.J. Franklin, B. Moon, A. Ailamaki (Eds.)
-
Hacigümüs H., Iyer B., Mehrotra S., Li C. Executing SQL over encrypted data in the database-service-provider model June 2002, ACM. M.J. Franklin, B. Moon, A. Ailamaki (Eds.).
-
(2002)
Executing SQL over encrypted data in the database-service-provider model
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
9
-
-
66249092071
-
-
ACM, G. Weikum, A. Christian König, S. Deloch (Eds.)
-
Agrawal R., Kierman J., Srikant R., Xu Y. Order preserving encryption for numeric data June 2004, ACM. G. Weikum, A. Christian König, S. Deloch (Eds.).
-
(2004)
Order preserving encryption for numeric data
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
10
-
-
77749250556
-
-
ACM, U. Dayal, K.-Y. Whang, D.B. Lomet, G. Alonso, G.M. Lohman, M.L. Kersten, S.K. Cha, Y.-K. Kim (Eds.)
-
Wang H., Lakshmanan Laks V.S. Efficient secure query evaluation over encrypted XML databases September 2006, ACM. U. Dayal, K.-Y. Whang, D.B. Lomet, G. Alonso, G.M. Lohman, M.L. Kersten, S.K. Cha, Y.-K. Kim (Eds.).
-
(2006)
Efficient secure query evaluation over encrypted XML databases
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
12
-
-
79955981313
-
-
Springer, Y.-J. Lee, J. Li, K.-Y. Whang, D. Lee (Eds.)
-
Hacigümüs H., Iyer B., Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases March 2004, Springer. Y.-J. Lee, J. Li, K.-Y. Whang, D. Lee (Eds.).
-
(2004)
Efficient execution of aggregation queries over encrypted relational databases
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
13
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press, New York, R.A. DeMillo, R.J. Lipton, A.K. Jones (Eds.)
-
Rivest R.L., Adleman L., Dertouzos M.L. On data banks and privacy homomorphisms. Foundation of Secure Computations 1978, Academic Press, New York. R.A. DeMillo, R.J. Lipton, A.K. Jones (Eds.).
-
(1978)
Foundation of Secure Computations
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
14
-
-
65949090193
-
Fast query over encrypted character data in database
-
Wang Z.F., Dai J., Wang W., Shi B.L. Fast query over encrypted character data in database. CIS 2004, 4(4):289-300.
-
(2004)
CIS
, vol.4
, Issue.4
, pp. 289-300
-
-
Wang, Z.F.1
Dai, J.2
Wang, W.3
Shi, B.L.4
-
15
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
Ceselli A., Damiani E., De Capitani di Vimercati S., Jajodia S., Paraboschi S., Samarati P. Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 2005, 8(1):119-152.
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
16
-
-
26444555179
-
-
Morgan Kaufmann, J.C. Freytag, P.C. Lockemann, S. Abiteboul, M.J. Carey, P.G. Selinger, A. Heuer (Eds.)
-
Miklau G., Suciu D. Controlling access to published data using cryptography September 2003, Morgan Kaufmann. J.C. Freytag, P.C. Lockemann, S. Abiteboul, M.J. Carey, P.G. Selinger, A. Heuer (Eds.).
-
(2003)
Controlling access to published data using cryptography
-
-
Miklau, G.1
Suciu, D.2
-
17
-
-
67649651237
-
-
ACM, C. Koch, Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.)
-
De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Over-encryption: Management of access control evolution on outsourced data September 2007, ACM. C. Koch, Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.).
-
(2007)
Over-encryption: Management of access control evolution on outsourced data
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
12-1+12-46
-
De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Encryption policies for regulating access to outsourced data. ACM TODS 2010, 35(2):12:1-12:46.
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
20
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. IPL 1988, 27(2):95-98.
-
(1988)
IPL
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
21
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S., Taylor P. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS 1983, 1(3):239-248.
-
(1983)
ACM TOCS
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
22
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
18-1+18-43
-
Atallah M., Blanton M., Fazio N., Frikken K. Dynamic and efficient key management for access hierarchies. ACM TISSEC 2009, 12(3):18:1-18:43.
-
(2009)
ACM TISSEC
, vol.12
, Issue.3
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
25
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
De Santis A., Ferrara A.L., Masucci B. Cryptographic key assignment schemes for any access control policy. IPL 2004, 92(4):199-205.
-
(2004)
IPL
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
26
-
-
34250651882
-
-
VLDB Foundation, M. Stonebraker, G. Weikum, D. DeWitt (Eds.)
-
Aggarwal G., Bawa M., Ganesan P., Garcia-Molina H., Kenthapadi K., Motwani R. Two can keep a secret: A distributed architecture for secure database services January 2005, VLDB Foundation. M. Stonebraker, G. Weikum, D. DeWitt (Eds.).
-
(2005)
Two can keep a secret: A distributed architecture for secure database services
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-molina, H.4
Kenthapadi, K.5
Motwani, R.6
-
27
-
-
38049032965
-
-
Springer, J. Biskup, J. Lopez (Eds.)
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Fragmentation and encryption to enforce privacy in data storage September 2007, Springer. J. Biskup, J. Lopez (Eds.).
-
(2007)
Fragmentation and encryption to enforce privacy in data storage
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
28
-
-
70350355128
-
-
Springer, M. Backes, P. Ning (Eds.)
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Keep a few: Outsourcing data while maintaining confidentiality September 2009, Springer. M. Backes, P. Ning (Eds.).
-
(2009)
Keep a few: Outsourcing data while maintaining confidentiality
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
29
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
22-1+22-33
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 2010, 13(3):22:1-22:33.
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
30
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati P. Protecting respondents' identities in microdata release. IEEE TKDE 2001, 13(6):1010-1027.
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
32
-
-
70350222224
-
-
IEEE Computer Society
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Fragmentation design for efficient query execution over sensitive distributed databases June 2009, IEEE Computer Society.
-
(2009)
Fragmentation design for efficient query execution over sensitive distributed databases
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
33
-
-
70350370035
-
-
Springer, E. Gudes, J. Vaidya (Eds.)
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P. Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients July 2009, Springer. E. Gudes, J. Vaidya (Eds.).
-
(2009)
Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
34
-
-
84967222929
-
-
Kluwer, S.D.C.D. Vimercati, I. Ray, I. Ray (Eds.)
-
Hacigümüs H., Iyer B., Mehrotra S. Ensuring integrity of encrypted databases in database as a service model August 2003, Kluwer. S.D.C.D. Vimercati, I. Ray, I. Ray (Eds.).
-
(2003)
Ensuring integrity of encrypted databases in database as a service model
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
35
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun E., Narasimha M., Tsudik G. Authentication and integrity in outsourced databases. ACM TOS 2006, 2(2):107-138.
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
37
-
-
33746668803
-
-
Springer, P. Samarati, P.Y.A. Ryan, D. Gollmann, R. Molva (Eds.)
-
Mykletun E., Narasimha M., Tsudik G. Signature bouquets: immutability for aggregated/condensed signatures September 2004, Springer. P. Samarati, P.Y.A. Ryan, D. Gollmann, R. Molva (Eds.).
-
(2004)
Signature bouquets: immutability for aggregated/condensed signatures
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
38
-
-
84884041524
-
-
Kluwer, B.M. Thuraisingham, R.P. van de Riet, K.R. Dittrich, Z. Tari (Eds.)
-
Devanbu P.T., Gertz M., Martel C.U., Stubblebine S.G. Authentic third-party data publication August 2000, Kluwer. B.M. Thuraisingham, R.P. van de Riet, K.R. Dittrich, Z. Tari (Eds.).
-
(2000)
Authentic third-party data publication
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
39
-
-
85048840252
-
-
ACM, S. Chaudhuri, V. Hristidis, N. Polyzotis (Eds.)
-
Li F., Hadjieleftheriou M., Kollios G., Reyzin L. Dynamic authenticated index structures for outsourced databases June 2006, ACM. S. Chaudhuri, V. Hristidis, N. Polyzotis (Eds.).
-
(2006)
Dynamic authenticated index structures for outsourced databases
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
41
-
-
78649809412
-
-
ACM, O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, W. Teiken (Eds.)
-
Narasimha M., Tsudik G. DSAC: Integrity for outsourced databases with signature aggregation and chaining October-November 2005, ACM. O. Herzog, H.-J. Schek, N. Fuhr, A. Chowdhury, W. Teiken (Eds.).
-
(2005)
DSAC: Integrity for outsourced databases with signature aggregation and chaining
-
-
Narasimha, M.1
Tsudik, G.2
-
44
-
-
84883942164
-
-
ACM, U. çetintemel, S.B. Zdonik, D. Kossmann, N. Tatbul (Eds.)
-
Yang Y., Papadias D., Papadopoulos S., Kalnis P. Authenticated join processing in outsourced databases June-July 2009, ACM. U. çetintemel, S.B. Zdonik, D. Kossmann, N. Tatbul (Eds.).
-
(2009)
Authenticated join processing in outsourced databases
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
45
-
-
70849134665
-
-
IEEE Computer Society, IEEE Computer Society, J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.)
-
Liu R., Wang H. Integrity verification of outsourced XML databases August 2009, IEEE Computer Society, IEEE Computer Society. J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.).
-
(2009)
Integrity verification of outsourced XML databases
-
-
Liu, R.1
Wang, H.2
-
46
-
-
84884094506
-
-
ACM, J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.)
-
Wang H., Yin J., Perng C., Yu P.S. Dual encryption for query integrity assurance October 2008, ACM. J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.).
-
(2008)
Dual encryption for query integrity assurance
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.S.4
-
47
-
-
43349104574
-
-
ACM, C. Koch, J. Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.)
-
Xie M., Wang H., Yin J., Meng X. Integrity auditing of outsourced data September 2007, ACM. C. Koch, J. Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.).
-
(2007)
Integrity auditing of outsourced data
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
49
-
-
84884087232
-
-
K. Böhm, C.S. Jensen, L.M. Haas, M.L. Kersten, P.-A. Larson, B.C. Ooi (Eds.)
-
Sion R. Query execution assurance for outsourced databases August-September 2005, K. Böhm, C.S. Jensen, L.M. Haas, M.L. Kersten, P.-A. Larson, B.C. Ooi (Eds.).
-
(2005)
Query execution assurance for outsourced databases
-
-
Sion, R.1
-
50
-
-
84884056829
-
-
ACM, A. Kemper, P. Valduriez, N. Mouaddib, J. Teubner, M. Bouzeghoub, V. Markl, L. Amsaleg, I. Manolescu (Eds.)
-
Xie M., Wang H., Yin J., Meng X. Providing freshness guarantees for outsourced databases March 2008, ACM. A. Kemper, P. Valduriez, N. Mouaddib, J. Teubner, M. Bouzeghoub, V. Markl, L. Amsaleg, I. Manolescu (Eds.).
-
(2008)
Providing freshness guarantees for outsourced databases
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
|