-
1
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, June
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient and private access to outsourced data," in Proc. of ICDCS, Minneapolis, MN, June 2011.
-
(2011)
Proc. of ICDCS
-
-
De Capitani Di Vimercat, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
2
-
-
84881250193
-
ObliviStore: High performance oblivious cloud storage
-
San Francisco, CA, May
-
E. Stefanov and E. Shi, "ObliviStore: High performance oblivious cloud storage," in Proc. of IEEE S&P, San Francisco, CA, May 2013.
-
(2013)
Proc. of IEEE S&P
-
-
Stefanov, E.1
Shi, E.2
-
3
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
Berlin, Germany, Nov
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path oram: An extremely simple Oblivious RAM protocol," in Proc. of CCS, Berlin, Germany, Nov. 2013.
-
(2013)
Proc. of CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
4
-
-
84899006582
-
Inference attack against encrypted range queries on outsourced databases
-
San Antonio, TX, March
-
M. Islam, M. Kuzu, and M. Kantarcioglu, "Inference attack against encrypted range queries on outsourced databases," in Proc. of CODASPY, San Antonio, TX, March 2014.
-
(2014)
Proc. of CODASPY
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
5
-
-
84878298643
-
Enhancing access privacy of range retrievals over b+-trees
-
H. Pang, J. Zhang, and K. Mouratidis, "Enhancing access privacy of range retrievals over B+-trees," IEEE TKDE, vol. 25, no. 7, pp. 1533-1547, 2013.
-
(2013)
IEEE TKDE
, vol.25
, Issue.7
, pp. 1533-1547
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
6
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China, April
-
P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. of ASIACCS, Beijing, China, April 2010.
-
(2010)
Proc. of ASIACCS
-
-
Samarati, P.1
De Capitani Di Vimercat, S.2
-
7
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
July
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Combining fragmentation and encryption to protect privacy in data storage," ACM TISSEC, vol. 13, no. 3, pp. 22:1-22:33, July 2010.
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
, pp. 221-2233
-
-
Ciriani, V.1
De Capitani Di Vimercat, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, Cyprus, December
-
R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing," in Proc. of CSE, Paphos, Cyprus, December 2012.
-
(2012)
Proc. of CSE
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
9
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Madison, WI, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of SIGMOD, Madison, WI, June 2002.
-
(2002)
Proc. of SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
10
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, 2012.
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
11
-
-
77951205188
-
A survey of singledatabase private information retrieval: Techniques and applications
-
Beijing, China, April
-
R. Ostrovsky and W. E. Skeith, III, "A survey of singledatabase private information retrieval: Techniques and applications," in Proc. of PKC, Beijing, China, April 2007.
-
(2007)
Proc. of PKC
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
12
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
Prague, Czech Republic, May
-
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. of EUROCRYPT, Prague, Czech Republic, May 1999.
-
(1999)
Proc. of EUROCRYPT
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
13
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandria, VA, October
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc of CCS, Alexandria, VA, October 2008.
-
(2008)
Proc of CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
14
-
-
84945211829
-
The melbourne shuffle: Improving oblivious storage in the cloud
-
Copenhagen, Denmark, July
-
O. Ohrimenko, M. Goodrich, R. Tamassia, and E. Upfal, "The Melbourne Shuffle: Improving oblivious storage in the cloud," in Proc. of ICLAP, Copenhagen, Denmark, July 2014.
-
(2014)
Proc. of ICLAP
-
-
Ohrimenko, O.1
Goodrich, M.2
Tamassia, R.3
Upfal, E.4
-
15
-
-
84910593773
-
Distributed oblivious ram for secure two-party computation
-
Japan, March
-
S. Lu and R. Ostrovsky, "Distributed Oblivious RAM for secure two-party computation," in Proc. of TCC, Tokyo, Japan, March 2013.
-
(2013)
Proc. of TCC, Tokyo
-
-
Lu, S.1
Ostrovsky, R.2
-
16
-
-
84889071325
-
Multi-cloud oblivious storage
-
Berlin, Germany, November
-
E. Stefanov and E. Shi, "Multi-cloud oblivious storage," in Proc. of ACM CCS, Berlin, Germany, November 2013.
-
(2013)
Proc. of ACM CCS
-
-
Stefanov, E.1
Shi, E.2
-
17
-
-
33646382224
-
Hiding traversal of tree structured data from untrusted data stores
-
Porto, Portugal, April
-
P. Lin and K. Candan, "Hiding traversal of tree structured data from untrusted data stores," in Proc. of WOSIS, Porto, Portugal, April 2004.
-
(2004)
Proc. of WOSIS
-
-
Lin, P.1
Candan, K.2
-
18
-
-
80053019963
-
A light-weight solution to preservation of access pattern privacy in un-trusted clouds
-
Leuven, Belgium, Sep
-
K. Yang, J. Zhang, W. Zhang, and D. Qiao, "A light-weight solution to preservation of access pattern privacy in un-trusted clouds," in Proc. of ESORICS, Leuven, Belgium, Sep. 2011.
-
(2011)
Proc. of ESORICS
-
-
Yang, K.1
Zhang, J.2
Zhang, W.3
Qiao, D.4
-
19
-
-
84884738971
-
Distributed shuffling for preserving access confidentiality
-
Egham, UK
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Distributed shuffling for preserving access confidentiality," in Proc. of ESORICS, Egham, UK, 2013.
-
(2013)
Proc. of ESORICS
-
-
De Capitani Di Vimercat, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
20
-
-
84881468744
-
Supporting concurrency and multiple indexes in private access to outsourced data
-
-, "Supporting concurrency and multiple indexes in private access to outsourced data," JCS, vol. 21, no. 3, pp. 425-461, 2013.
-
(2013)
JCS
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitani Di Vimercat, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
21
-
-
34250651882
-
Two can keep a secret: A distributed architecture for secure database services
-
Asilomar, CA, January
-
G. Aggarwal et al., "Two can keep a secret: A distributed architecture for secure database services," in Proc. of CIDR, Asilomar, CA, January 2005.
-
(2005)
Proc. of CIDR
-
-
Aggarwal, G.1
|