-
1
-
-
84881362635
-
Secure and privacy-preserving database services in the cloud
-
To appear
-
Divyakant Agrawal, Amr El Abbadi, and Shiyuan Wang. Secure and privacy-preserving database services in the cloud. In ICDE, 2013. (To appear).
-
(2013)
ICDE
-
-
Agrawal, D.1
El Abbadi, A.2
Wang, S.3
-
2
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order-preserving encryption for numeric data. In SIGMOD Conference, pages 563-574, 2004.
-
(2004)
SIGMOD Conference
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
85084014165
-
Orthogonal security with cipherbase
-
Arvind Arasu, Spyros Blanas, Ken Eguro, et al. Orthogonal security with cipherbase. In CIDR, 2013.
-
(2013)
CIDR
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
-
5
-
-
84881350341
-
Querying encrypted data
-
Arvind Arasu, Ken Eguro, Raghav Kaushik, and Ravi Ramamurthy. Querying encrypted data. In ICDE, pages 1262-1263, 2013.
-
(2013)
ICDE
, pp. 1262-1263
-
-
Arasu, A.1
Eguro, K.2
Kaushik, R.3
Ramamurthy, R.4
-
6
-
-
79959972183
-
TrustedDB: A trusted hardware based database with privacy and data confidentiality
-
Sumeet Bajaj and Radu Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD Conference, pages 205-216, 2011.
-
(2011)
SIGMOD Conference
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
7
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, pages 578-595, 2011.
-
(2011)
CRYPTO
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
8
-
-
80053161148
-
Relational cloud: A database service for the cloud
-
Carlo Curino, Evan P. C. Jones, Raluca A. Popa, Nirmesh Malviya, Eugene Wu, Samuel Madden, Hari Balakrishnan, and Nickolai Zeldovich. Relational cloud: a database service for the cloud. In CIDR, pages 235-240, 2011.
-
(2011)
CIDR
, pp. 235-240
-
-
Curino, C.1
Jones, E.P.C.2
Popa, R.A.3
Malviya, N.4
Wu, E.5
Madden, S.6
Balakrishnan, H.7
Zeldovich, N.8
-
9
-
-
84870691127
-
FPGAs for trusted cloud computing
-
K. Eguro and R. Venkatesan. FPGAs for trusted cloud computing. In FPL, 2012.
-
(2012)
FPL
-
-
Eguro, K.1
Venkatesan, R.2
-
11
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, 1996.
-
(1996)
J ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
79959681766
-
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
-
Michael T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, pages 379-388, 2011.
-
(2011)
SPAA
, pp. 379-388
-
-
Goodrich, M.T.1
-
13
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Hakan Hacigümüs, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD Conference, pages 216-227, 2002.
-
(2002)
SIGMOD Conference
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
16
-
-
85018745458
-
-
Intel software guard extensions (intel SGX). http://software.intel.com/ en-us/intel-isa-extensions#pid-19539-1495.
-
Intel Software Guard Extensions
-
-
-
18
-
-
84880554779
-
-
Microsoft Corporation
-
Microsoft Corporation. SQL Azure. http://www.windowsazure.com/enus/home/ features/sql-azure/.
-
SQL Azure
-
-
-
19
-
-
84880533681
-
-
Microsoft Corporation. SQL Server Encryption. http://technet.microsoft. com/en-us/library/bb510663.aspx.
-
SQL Server Encryption
-
-
-
22
-
-
84880543568
-
-
Oracle Corporation. Transparent Data Encryption. http://www.oracle.com/ technetwork/database/options/advanced-security/index-099011.html.
-
Transparent Data Encryption
-
-
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, et al. Cryptdb: protecting confidentiality with encrypted query processing. In SOSP, pages 85-100, 2011.
-
(2011)
SOSP
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
-
25
-
-
79952940395
-
Secure data outsourcing
-
Radu Sion. Secure data outsourcing. In VLDB, pages 1431-1432, 2007.
-
(2007)
VLDB
, pp. 1431-1432
-
-
Sion, R.1
|