-
1
-
-
3142716056
-
Order-preserving encryption for numeric data
-
R. Agrawal and J. Kiernan et al. Order-preserving encryption for numeric data. In SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
-
2
-
-
84880553279
-
Secure database-as-a-service with cipherbase
-
A. Arasu et al. Secure database-as-a-service with cipherbase. In SIGMOD, 2013.
-
(2013)
SIGMOD
-
-
Arasu, A.1
-
3
-
-
79959972183
-
Trusteddb: A trusted hardware based database with privacy and data confidentiality
-
S. Bajaj et al. Trusteddb: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, 2011.
-
(2011)
SIGMOD
-
-
Bajaj, S.1
-
4
-
-
84894068253
-
A universal toolkit for cryptographically secure privacy-preserving data mining
-
D. Bogdanov et al. A universal toolkit for cryptographically secure privacy-preserving data mining. In PAISI, 2012.
-
(2012)
PAISI
-
-
Bogdanov, D.1
-
5
-
-
84881219587
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
A. Boldyreva et al. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
-
(2011)
CRYPTO
-
-
Boldyreva, A.1
-
6
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh et al. Public key encryption with keyword search. In EUROCRYPT, 2004.
-
(2004)
EUROCRYPT
-
-
Boneh, D.1
-
7
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
E. Damiani et al. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003.
-
(2003)
CCS
-
-
Damiani, E.1
-
8
-
-
80052578965
-
Elastras: An elastic transactional data store in the cloud
-
S. Das and D. Agrawal et al. Elastras: An elastic transactional data store in the cloud. CoRR, 2010.
-
(2010)
CoRR
-
-
Das, S.1
Agrawal, D.2
-
9
-
-
85081815216
-
CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service
-
S. Das, V. Narasayya, and F. Li et al. CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service. PVLDB, 2014.
-
(2014)
PVLDB
-
-
Das, S.1
Narasayya, V.2
Li, F.3
-
10
-
-
79959957556
-
Zephyr: Live migration in shared nothing databases for elastic cloud platforms
-
A. J. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Zephyr: live migration in shared nothing databases for elastic cloud platforms. In SIGMOD, 2011.
-
(2011)
SIGMOD
-
-
Elmore, A.J.1
Das, S.2
Agrawal, D.3
El Abbadi, A.4
-
11
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekçi, D. Agrawal, and A. El Abbadi. Privacy preserving query processing using third parties. In ICDE, 2006.
-
(2006)
ICDE
-
-
Emekçi, F.1
Agrawal, D.2
El Abbadi, A.3
-
12
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
-
(2009)
STOC
-
-
Gentry, C.1
-
13
-
-
84859966018
-
Fully homomorphic encryption with polylog overhead
-
C. Gentry et al. Fully homomorphic encryption with polylog overhead. In EUROCRYPT, 2012.
-
(2012)
EUROCRYPT
-
-
Gentry, C.1
-
16
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigümüs et al. and B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, 2002.
-
(2002)
SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
17
-
-
85065578926
-
A privacy preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik. A privacy preserving index for range queries. In VLDB, 2004.
-
(2004)
VLDB
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
18
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioglu and C. Chris. Privacy-preserving distributed mining of association rules on horizontally partitioned data. TKDE, 2004.
-
(2004)
TKDE
-
-
Kantarcioglu, M.1
Chris, C.2
-
20
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
21
-
-
79957865770
-
Secure and efficient in-network processing of exact sum queries
-
S. Papadopoulos et al. Secure and efficient in-network processing of exact sum queries. In ICDE, 2011.
-
(2011)
ICDE
-
-
Papadopoulos, S.1
-
22
-
-
84865653421
-
Cryptdb: Processing queries on an encrypted database
-
R. A. Popa et al. Cryptdb: processing queries on an encrypted database. CACM, 2012.
-
(2012)
CACM
-
-
Popa, R.A.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest et al.and A. Shamir and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. CACM, 1978.
-
(1978)
CACM
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
70049084649
-
Automatic virtual machine configuration for database workloads
-
A. Soror et al. Automatic virtual machine configuration for database workloads. In SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Soror, A.1
-
25
-
-
84881085215
-
Processing analytical queries over encrypted data
-
S. Tu and M. F. Kaashoek et al. Processing analytical queries over encrypted data. In PVLDB, 2013.
-
(2013)
PVLDB
-
-
Tu, S.1
Kaashoek, M.F.2
-
26
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
J. Vaidya et al. Secure set intersection cardinality with application to association rule mining. JCS, 2005.
-
(2005)
JCS
-
-
Vaidya, J.1
-
27
-
-
84904316636
-
A comprehensive framework for secure query processing on relational data in the cloud
-
S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, 2011.
-
(2011)
SDM
-
-
Wang, S.1
Agrawal, D.2
El Abbadi, A.3
-
28
-
-
84880559661
-
Parallel analytics as a service
-
P. Wong, Z. He, and E. Lo. Parallel analytics as a service. In SIGMOD, 2013.
-
(2013)
SIGMOD
-
-
Wong, P.1
He, Z.2
Lo, E.3
-
29
-
-
84904325063
-
Secure query processing with data interoperability in a cloud database environment
-
Department of Computer Science, University of Hong Kong
-
W. K. Wong et al. Secure query processing with data interoperability in a cloud database environment. Technical Report TR-2014-03, Department of Computer Science, University of Hong Kong, 2014.
-
(2014)
Technical Report TR-2014-03
-
-
Wong, W.K.1
-
30
-
-
0001772530
-
Protocols for secure computations (extended abstract)
-
A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.C.1
|