메뉴 건너뛰기




Volumn , Issue , 2012, Pages 361-388

Protecting data in outsourcing scenarios

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84883985628     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-415815-3.00014-5     Document Type: Chapter
Times cited : (5)

References (50)
  • 1
    • 70449469756 scopus 로고    scopus 로고
    • Data center evolution: A tutorial on state of the art, issues, and challenges
    • Kant K. Data center evolution: A tutorial on state of the art, issues, and challenges. Comput. Netw. 2009, 53(17):2939-2965.
    • (2009) Comput. Netw. , vol.53 , Issue.17 , pp. 2939-2965
    • Kant, K.1
  • 2
    • 60649105959 scopus 로고    scopus 로고
    • Privacy-aware biometrics: Design and implementation of a multimodal verification system
    • IEEE Computer Society, Anaheim, CA
    • Cimato S., Gamassi M., Piuri V., Sassi R., Scotti F. Privacy-aware biometrics: Design and implementation of a multimodal verification system. Proc. of ACSAC 2008 December 2008, IEEE Computer Society, Anaheim, CA.
    • (2008) Proc. of ACSAC 2008
    • Cimato, S.1    Gamassi, M.2    Piuri, V.3    Sassi, R.4    Scotti, F.5
  • 3
    • 4644223618 scopus 로고    scopus 로고
    • Accuracy and performance of biometric systems
    • IEEE Computer Society, Como, Italy, S. Demidenko, R. Ottoboni, D. Petri, V. Piuri, D. Chong, T. Weng (Eds.)
    • Gamassi M., Lazzaroni M., Misino M., Piuri V., Sana D., Scotti F. Accuracy and performance of biometric systems. Proc. of IMTC 2004 2004, IEEE Computer Society, Como, Italy. S. Demidenko, R. Ottoboni, D. Petri, V. Piuri, D. Chong, T. Weng (Eds.).
    • (2004) Proc. of IMTC 2004
    • Gamassi, M.1    Lazzaroni, M.2    Misino, M.3    Piuri, V.4    Sana, D.5    Scotti, F.6
  • 13
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • Academic Press, New York, R.A. DeMillo, R.J. Lipton, A.K. Jones (Eds.)
    • Rivest R.L., Adleman L., Dertouzos M.L. On data banks and privacy homomorphisms. Foundation of Secure Computations 1978, Academic Press, New York. R.A. DeMillo, R.J. Lipton, A.K. Jones (Eds.).
    • (1978) Foundation of Secure Computations
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 14
    • 65949090193 scopus 로고    scopus 로고
    • Fast query over encrypted character data in database
    • Wang Z.F., Dai J., Wang W., Shi B.L. Fast query over encrypted character data in database. CIS 2004, 4(4):289-300.
    • (2004) CIS , vol.4 , Issue.4 , pp. 289-300
    • Wang, Z.F.1    Dai, J.2    Wang, W.3    Shi, B.L.4
  • 16
    • 26444555179 scopus 로고    scopus 로고
    • Morgan Kaufmann, J.C. Freytag, P.C. Lockemann, S. Abiteboul, M.J. Carey, P.G. Selinger, A. Heuer (Eds.)
    • Miklau G., Suciu D. Controlling access to published data using cryptography September 2003, Morgan Kaufmann. J.C. Freytag, P.C. Lockemann, S. Abiteboul, M.J. Carey, P.G. Selinger, A. Heuer (Eds.).
    • (2003) Controlling access to published data using cryptography
    • Miklau, G.1    Suciu, D.2
  • 20
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. IPL 1988, 27(2):95-98.
    • (1988) IPL , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 21
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S., Taylor P. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS 1983, 1(3):239-248.
    • (1983) ACM TOCS , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 22
    • 60349128962 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • 18-1+18-43
    • Atallah M., Blanton M., Fazio N., Frikken K. Dynamic and efficient key management for access hierarchies. ACM TISSEC 2009, 12(3):18:1-18:43.
    • (2009) ACM TISSEC , vol.12 , Issue.3
    • Atallah, M.1    Blanton, M.2    Fazio, N.3    Frikken, K.4
  • 25
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • De Santis A., Ferrara A.L., Masucci B. Cryptographic key assignment schemes for any access control policy. IPL 2004, 92(4):199-205.
    • (2004) IPL , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 30
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati P. Protecting respondents' identities in microdata release. IEEE TKDE 2001, 13(6):1010-1027.
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 35
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • Mykletun E., Narasimha M., Tsudik G. Authentication and integrity in outsourced databases. ACM TOS 2006, 2(2):107-138.
    • (2006) ACM TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 45
    • 70849134665 scopus 로고    scopus 로고
    • IEEE Computer Society, IEEE Computer Society, J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.)
    • Liu R., Wang H. Integrity verification of outsourced XML databases August 2009, IEEE Computer Society, IEEE Computer Society. J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.).
    • (2009) Integrity verification of outsourced XML databases
    • Liu, R.1    Wang, H.2
  • 46
    • 84884094506 scopus 로고    scopus 로고
    • ACM, J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.)
    • Wang H., Yin J., Perng C., Yu P.S. Dual encryption for query integrity assurance October 2008, ACM. J.G. Shanahan, S. Amer-Yahia, I. Manolescu, Y. Zhang, D.A. Evans, A. Kolcz, K.-S. Choi, A. Chowdhury (Eds.).
    • (2008) Dual encryption for query integrity assurance
    • Wang, H.1    Yin, J.2    Perng, C.3    Yu, P.S.4
  • 47
    • 43349104574 scopus 로고    scopus 로고
    • ACM, C. Koch, J. Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.)
    • Xie M., Wang H., Yin J., Meng X. Integrity auditing of outsourced data September 2007, ACM. C. Koch, J. Gehrke, M.N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold (Eds.).
    • (2007) Integrity auditing of outsourced data
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 49
    • 84884087232 scopus 로고    scopus 로고
    • K. Böhm, C.S. Jensen, L.M. Haas, M.L. Kersten, P.-A. Larson, B.C. Ooi (Eds.)
    • Sion R. Query execution assurance for outsourced databases August-September 2005, K. Böhm, C.S. Jensen, L.M. Haas, M.L. Kersten, P.-A. Larson, B.C. Ooi (Eds.).
    • (2005) Query execution assurance for outsourced databases
    • Sion, R.1
  • 50
    • 84884056829 scopus 로고    scopus 로고
    • ACM, A. Kemper, P. Valduriez, N. Mouaddib, J. Teubner, M. Bouzeghoub, V. Markl, L. Amsaleg, I. Manolescu (Eds.)
    • Xie M., Wang H., Yin J., Meng X. Providing freshness guarantees for outsourced databases March 2008, ACM. A. Kemper, P. Valduriez, N. Mouaddib, J. Teubner, M. Bouzeghoub, V. Markl, L. Amsaleg, I. Manolescu (Eds.).
    • (2008) Providing freshness guarantees for outsourced databases
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.