메뉴 건너뛰기




Volumn , Issue , 2006, Pages 127-138

Efficient secure query evaluation over encrypted XML databases

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; METADATA; PROBABILITY DISTRIBUTIONS; QUERY LANGUAGES; XML;

EID: 84893821498     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (111)

References (26)
  • 1
    • 33244467922 scopus 로고    scopus 로고
    • Security analysis of O'ryptographically controlled access to XML documents
    • M. Abadi et al., "Security Analysis of O'ryptographically Controlled Access to XML Documents,", PODS 2005.
    • (2005) PODS
    • Abadi, M.1
  • 2
    • 84863338303 scopus 로고    scopus 로고
    • Two can keep a secret: A distributed architecture for secure database services
    • G. Aggrawal et al., "Two can Keep a Secret: A distributed Architecture for Secure Database Services,", CIDR 2005.
    • (2005) CIDR
    • Aggrawal, G.1
  • 3
    • 66249092071 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data
    • Ft. Agrawal et al., "Order Preserving Encryption for Numeric Data,", SIGMOD 2001.
    • (2001) SIGMOD
    • Agrawal, F.T.1
  • 4
    • 0036209423 scopus 로고    scopus 로고
    • Structural joins: A primitive for efficient XML query pattern matching
    • S. Al-Khalifa et al., "Structural Joins: A Primitive for Efficient XML Query Pattern Matching,", ICDE 2002.
    • (2002) ICDE
    • Al-Khalifa, S.1
  • 5
    • 0010254147 scopus 로고    scopus 로고
    • Practice-oriented provable-security
    • M. Bellare, "Practice-oriented provable-security,", ISW 1997.
    • (1997) ISW
    • Bellare, M.1
  • 6
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E. Bertino et al., "Secure and selective dissemination of XML documents,", ACM Transactions on Information and System Security, 5(3), Page 290-331, 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1
  • 10
    • 0042710151 scopus 로고
    • A modification of the greedy algorithm for vertex cover
    • K.L. Clarkson, "A modification of the greedy algorithm for vertex cover,", Information Processing Letters, 16 (1983), pp. 23-25.
    • (1983) Information Processing Letters , vol.16 , pp. 23-25
    • Clarkson, K.L.1
  • 14
    • 33745620195 scopus 로고    scopus 로고
    • The case for access control on XML relationships
    • B. Finance et al., "The Case for Access Control on XML Relationships,", CIKM, 2005.
    • (2005) CIKM
    • Finance, B.1
  • 16
    • 3543133070 scopus 로고    scopus 로고
    • RDF metadata for XML access control
    • V. Gowadia et al., "RDF Metadata for XML Access Control,", ACM Workshop on Security, 2003.
    • (2003) ACM Workshop on Security
    • Gowadia, V.1
  • 17
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provided model
    • H. Hacigumus et al., "Executing SQL over Encrypted Data in the Database-Service-Provided Model,". SIGMOD 2002.
    • (2002) SIGMOD
    • Hacigumus, H.1
  • 18
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • B. Bore et al., "A Privacy-Preserving Index for Range Queries,". VLDB 2004.
    • (2004) VLDB
    • Bore, B.1
  • 20
    • 84883261388 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • F. Kushilevitz et al., "Replication is not needed: Single Database, Computationally-Private Information Retrieval,", FOCS97.
    • FOCS97
    • Kushilevitz, F.1
  • 21
    • 84991002123 scopus 로고    scopus 로고
    • Secure and privacy preserving outsourcing of tree structured data
    • P. Lin et al., "Secure and Privacy Preserving Outsourcing of Tree Structured Data,", SDM 2004.
    • (2004) SDM
    • Lin, P.1
  • 22
    • 84968422314 scopus 로고    scopus 로고
    • Bow to build a trusted database system on untrusted storage
    • U. Maheshwari et al., "Bow to Build a Trusted Database System on Untrusted Storage,", OSDI 2000.
    • (2000) OSDI
    • Maheshwari, U.1
  • 23
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • J. Miklau et al. "Controlling Access to Published Data Using Cryptography,", VLDB 2003.
    • (2003) VLDB
    • Miklau, J.1
  • 24
    • 84893852016 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau et al, "A Formal Analysis of Information Disclosure in Data Exchange,", SIGMOD 2001.
    • (2001) SIGMOD
    • Miklau, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.