-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of the 2nd Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA (January 2005)
-
Proc. of the 2nd Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA (January 2005)
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security 12(3), 18:1-18:43 (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proc. of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA (October-November 2007)
-
Proc. of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA (October-November 2007)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 171-186
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
5
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 440-455
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security (TISSEC) 13(3), 22:1-22:33 (2010)
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, USA (October 2003)
-
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, USA (October 2003)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
84864356094
-
Enforcing subscription-based authorization policies in cloud scenarios
-
Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. Springer, Heidelberg
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G.: Enforcing subscription-based authorization policies in cloud scenarios. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 314-329. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7371
, pp. 314-329
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
-
9
-
-
84888305233
-
Enforcing dynamic write privileges in data outsourcing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Computers & Security (COSE) 39, 47-63 (2013)
-
(2013)
Computers & Security (COSE)
, vol.39
, pp. 47-63
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
84881159065
-
Extending loose associations to multiple fragments
-
Wang, L., Shafiq, B. (eds.) DBSec 2013. Springer, Heidelberg
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Extending loose associations to multiple fragments. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 1-16. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7964
, pp. 1-16
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
84910146445
-
Fragmentation in presence of data dependencies
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE Transactions on Dependable and Secure Computing (TDSC) (2014)
-
(2014)
IEEE Transactions on Dependable and Secure Computing (TDSC)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems (TODS) 35(2), 12:1-12:46 (2010)
-
(2010)
ACM Transactions on Database Systems (TODS)
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. Proc. of the VLDB Endowment 3(1), 1370-1381 (2010)
-
(2010)
Proc. of the VLDB Endowment
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
84968747458
-
Integrity for join queries in the cloud
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE Transactions on Cloud Computing (TCC) 1(2), 187-200 (2013)
-
(2013)
IEEE Transactions on Cloud Computing (TCC)
, vol.1
, Issue.2
, pp. 187-200
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
84881438234
-
On information leakage by indexes over data fragments
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: On information leakage by indexes over data fragments. In: Proc. of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia (April 2013)
-
Proc. of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia (April 2013)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
16
-
-
84870916549
-
Data privacy: Definitions and techniques
-
De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: Definitions and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20(6), 793-817 (2012)
-
(2012)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.20
, Issue.6
, pp. 793-817
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Livraga, G.3
Samarati, P.4
-
17
-
-
80051865953
-
Efficient and private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA (June 2011)
-
Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA (June 2011)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
18
-
-
84884738971
-
Distributed shuffling for preserving access confidentiality
-
Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
-
DeCapitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Distributed shuffling for preserving access confidentiality. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 628-645. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8134
, pp. 628-645
-
-
DeCapitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
19
-
-
84881468744
-
Supporting concurrency and multiple indexes in private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency and multiple indexes in private access to outsourced data. Journal of Computer Security (JCS) 21(3), 425-461 (2013)
-
(2013)
Journal of Computer Security (JCS)
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
20
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland (October 2012)
-
Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland (October 2012)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
21
-
-
0030149547
-
Software protection and simulation on Oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on Oblivious RAMs. Journal of the ACM 43(3), 431-473 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
22
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2002), Madison, Wisconsin, USA (June 2002)
-
Proc. of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2002), Madison, Wisconsin, USA (June 2002)
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
23
-
-
84901649420
-
Ensuring integrity of encrypted databases in database as a service model
-
De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. Springer, Heidelberg
-
Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. IFIP, vol. 142, pp. 61-74. Springer, Heidelberg (2004)
-
(2004)
IFIP
, vol.142
, pp. 61-74
-
-
Hacigümüş, H.1
Iyer, B.2
Mehrotra, S.3
-
25
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus (December 2012)
-
Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus (December 2012)
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
26
-
-
84861316129
-
A comprehensive conceptual system-level approach to fault tolerance in cloud computing
-
Jhawar, R., Piuri, V., Santambrogio, M.: A comprehensive conceptual system-level approach to fault tolerance in cloud computing. In: Proc. of the 2012 IEEE International Systems Conference (SysCon 2012), Vancouver, BC, Canada (March 2012)
-
Proc. of the 2012 IEEE International Systems Conference (SysCon 2012), Vancouver, BC, Canada (March 2012)
-
-
Jhawar, R.1
Piuri, V.2
Santambrogio, M.3
-
27
-
-
84876800484
-
Fault tolerance management in cloud computing: A system-level perspective
-
Jhawar, R., Piuri, V., Santambrogio, M.: Fault tolerance management in cloud computing: A system-level perspective. IEEE Systems Journal 7(2), 288-297 (2013)
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.2
, pp. 288-297
-
-
Jhawar, R.1
Piuri, V.2
Santambrogio, M.3
-
28
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proc. of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA (October-November 2007)
-
Proc. of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA (October-November 2007)
-
-
Juels, A.1
Kaliski, B.2
-
29
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Transactions on Information and System Security (TISSEC) 13(4), 32:1-32:35 (2010)
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.4
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
30
-
-
84884802064
-
Fine-grained access control system based on outsourced attribute-based encryption
-
Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
-
Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592-609. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8134
, pp. 592-609
-
-
Li, J.1
Chen, X.2
Li, J.3
Jia, C.4
Ma, J.5
Lou, W.6
-
31
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2(2), 107-138 (2006)
-
(2006)
ACM Transactions on Storage (TOS)
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
32
-
-
38049002436
-
A survey of single-database private information retrieval: Techniques and applications
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Ostrovsky, R., Skeith III, W.E.: A survey of single-database private information retrieval: Techniques and applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393-411. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
33
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: Proc. of the ACM SIGMOD International Conference onManagement of Data (SIGMOD 2005), Baltimore, MA, USA (June 2005)
-
Proc. of the ACM SIGMOD International Conference OnManagement of Data (SIGMOD 2005), Baltimore, MA, USA (June 2005)
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
34
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Samarati, P., De Capitani di Vimercati, S.:Data protection in outsourcing scenarios: Issues and directions. In: Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China (April 2010)
-
Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China (April 2010)
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
35
-
-
84889005645
-
Path ORAM: An extremely simple Oblivious RAM protocol
-
Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: An extremely simple Oblivious RAM protocol. In: Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany (November 2013)
-
Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany (November 2013)
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
36
-
-
70349251911
-
Dual encryption for query integrity assurance
-
Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proc. of the 2008 ACM International Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, CA (October 2008)
-
Proc. of the 2008 ACM International Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, CA (October 2008)
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.4
-
37
-
-
84997556980
-
Integrity auditing of outsourced data
-
Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria (September 2007)
-
Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria (September 2007)
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
38
-
-
83255176095
-
Authentication of range query results in MapReduce environments
-
Yang, Z., Gao, S., Xu, J., Choi, B.: Authentication of range query results in MapReduce environments. In: Proc. of the 3rd International Workshop on Cloud Data Management (CloudDB 2011), Glasgow, U.K. (October 2011)
-
Proc. of the 3rd International Workshop on Cloud Data Management (CloudDB 2011), Glasgow, U.K. (October 2011)
-
-
Yang, Z.1
Gao, S.2
Xu, J.3
Choi, B.4
|