-
2
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Alexandria, VA, USA
-
M. Atallah, K. Frikken, and M. Blanton Dynamic and efficient key management for access hierarchies Proc. of CCS 2005 Alexandria, VA, USA
-
(2005)
Proc. of CCS
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
3
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, and L. Kissner Remote data checking using provable data possession ACM TISSEC 14 2011 12:1 12:34
-
(2011)
ACM TISSEC
, vol.14
, pp. 121-1234
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
-
4
-
-
0002757750
-
Keying hash functions for message authentication
-
Santa Barbara, CA, USA
-
M. Bellare, R. Canetti, and H. Krawczyk Keying hash functions for message authentication Proc. of CRYPTO 1996 Santa Barbara, CA, USA
-
(1996)
Proc. of CRYPTO
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati Balancing confidentiality and efficiency in untrusted relational DBMSs Proc. of CCS 2003 Washington, DC, USA
-
(2003)
Proc. of CCS
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Encryption policies for regulating access to outsourced data ACM TODS 35 2010 12:1 12:46
-
(2010)
ACM TODS
, vol.35
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
79952021726
-
Encryption-based policy enforcement for cloud storage
-
Genova, Italy
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati Encryption-based policy enforcement for cloud storage Proc. of SPCC 2010 Genova, Italy
-
(2010)
Proc. of SPCC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
8
-
-
80955143483
-
Private data indexes for selective access to outsourced data
-
Chicago, IL, USA
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Private data indexes for selective access to outsourced data Proc. of WPES 2011 Chicago, IL, USA
-
(2011)
Proc. of WPES
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
84863928276
-
Support for write privileges on outsourced data
-
Heraklion, Greece
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Support for write privileges on outsourced data Proc. of SEC 2012 Heraklion, Greece
-
(2012)
Proc. of SEC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
84888305521
-
Authenticated relational tables and authenticated skip lists
-
Redondo Beach, CA, USA
-
G. Di Battista, and B. Palazzi Authenticated relational tables and authenticated skip lists Proc. of DBSec 2007 Redondo Beach, CA, USA
-
(2007)
Proc. of DBSec
-
-
Di Battista, G.1
Palazzi, B.2
-
12
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI, USA
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li Executing SQL over encrypted data in the database-service-provider model Proc. of SIGMOD 2002 Madison, WI, USA
-
(2002)
Proc. of SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
13
-
-
84876800484
-
Fault tolerance management in cloud computing: A system-level perspective
-
R. Jhawar, V. Piuri, and M. Santambrogio Fault tolerance management in cloud computing: a system-level perspective IEEE Systems Journal pp 99 2012
-
(2012)
IEEE Systems Journal
, vol.PP
, Issue.99
-
-
Jhawar, R.1
Piuri, V.2
Santambrogio, M.3
-
14
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, Cyprus
-
R. Jhawar, V. Piuri, and P. Samarati Supporting security requirements for resource management in cloud computing Proc. of CSE 2012 Paphos, Cyprus
-
(2012)
Proc. of CSE
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
15
-
-
0001263548
-
A certified digital signature
-
Santa Barbara, CA, USA
-
R. Merkle A certified digital signature Proc. of CRYPTO 1989 Santa Barbara, CA, USA
-
(1989)
Proc. of CRYPTO
-
-
Merkle, R.1
-
16
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany
-
G. Miklau, and D. Suciu Controlling access to published data using cryptography Proc. of VLDB 2003 Berlin, Germany
-
(2003)
Proc. of VLDB
-
-
Miklau, G.1
Suciu, D.2
-
17
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
DOI 10.1145/1149976.1149977
-
G. Miklau, and D. Suciu Controlling access to published data using cryptography Proc. of VLDB 2003 Berlin, Germany (Pubitemid 44232391)
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
18
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Baltimore, MA, USA
-
H. Pang, A. Jain, K. Ramamritham, and K. Tan Verifying completeness of relational query results in data publishing Proc. of SIGMOD 2005 Baltimore, MA, USA
-
(2005)
Proc. of SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
19
-
-
84888295277
-
Privacy enhanced access control for outsourced data sharing
-
Bonaire
-
M. Raykova, H. Zhao, and S. Bellovin Privacy enhanced access control for outsourced data sharing Proc. of FC 2012 Bonaire
-
(2012)
Proc. of FC
-
-
Raykova, M.1
Zhao, H.2
Bellovin, S.3
-
20
-
-
84863686587
-
Privacy preserving access control with authentication for securing data in clouds
-
Ottawa, Canada
-
S. Ruj, M. Stojmenovic, and A. Nayak Privacy preserving access control with authentication for securing data in clouds Proc. of CCGrid 2012 Ottawa, Canada
-
(2012)
Proc. of CCGrid
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
21
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China
-
P. Samarati, and S. De Capitani di Vimercati Data protection in outsourcing scenarios: Issues and directions Proc. of ASIACCS 2010 Beijing, China
-
(2010)
Proc. of ASIACCS
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
22
-
-
33745601730
-
Query execution assurance for outsourced databases
-
Trondheim, Norway
-
R. Sion Query execution assurance for outsourced databases Proc. of VLDB 2005 Trondheim, Norway
-
(2005)
Proc. of VLDB
-
-
Sion, R.1
-
23
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
Seoul, Korea
-
H. Wang, and L.V.S. Lakshmanan Efficient secure query evaluation over encrypted XML databases Proc. of VLDB 2006 Seoul, Korea
-
(2006)
Proc. of VLDB
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
24
-
-
70349251911
-
Dual encryption for query integrity assurance
-
Napa Valley, CA, USA
-
H. Wang, J. Yin, C. Perng, and P. Yu Dual encryption for query integrity assurance Proc. of CIKM 2008 Napa Valley, CA, USA
-
(2008)
Proc. of CIKM
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.4
-
25
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE TPDS 23 2012 1467 1479
-
(2012)
IEEE TPDS
, vol.23
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
26
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou Privacy-preserving public auditing for secure cloud storage IEEE TC 62 2012 362 375
-
(2012)
IEEE TC
, vol.62
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
28
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA, USA
-
S. Yu, C. Wang, K. Ren, and W. Lou Achieving secure, scalable, and fine-grained data access control in cloud computing Proc. of INFOCOM 2010 San Diego, CA, USA
-
(2010)
Proc. of INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
29
-
-
84976588717
-
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
-
Guangzhou, China
-
F. Zhao, T. Nishide, and K. Sakurai Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems Proc. of ISPEC 2011 Guangzhou, China
-
(2011)
Proc. of ISPEC
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
|