-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Asilomar, CA, USA, January
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR 2005, Asilomar, CA, USA (January 2005)
-
(2005)
Proc. Of CIDR 2005
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, June
-
Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of SIGMOD 2004, Paris, France (June 2004)
-
(2004)
Proc. Of SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
84863769012
-
Querying schemas with access restrictions
-
Benedikt, M., Bourhis, P., Ley, C.: Querying schemas with access restrictions. Proc. of VLDB Endowment 5(7), 634-645 (2012)
-
(2012)
Proc. Of VLDB Endowment
, vol.5
, Issue.7
, pp. 634-645
-
-
Benedikt, M.1
Bourhis, P.2
Ley, C.3
-
4
-
-
80054794829
-
On the inference-proofness of database fragmentation satisfying confidentiality constraints
-
In: Lai, X., Zhou, J., Li, H. (eds.), Springer, Heidelberg
-
Biskup, J., Preus, M., Wiese, L.: On the inference-proofness of database fragmentation satisfying confidentiality constraints. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 246-261. Springer, Heidelberg (2011)
-
(2011)
ISC 2011. LNCS
, vol.7001
, pp. 246-261
-
-
Biskup, J.1
Preus, M.2
Wiese, L.3
-
5
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 8(1), 119-152 (2005)
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), Springer, Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
ACNS 2005. LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
i, S., Samarati, P.: Fragmentatio, torage. In: Biskup
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., L´opez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
-
(2004)
And Encryption to Enforce Pr
, pp. 171-186
-
-
Ciriani, V.1
-
8
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
Montreal, Canada
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of ICDCS 2009, Montreal, Canada (June 2009)
-
(2009)
Proc. Of ICDCS 2009
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
In: Backes, M., Ning, P. (eds.), Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 440-455
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., DeCapitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
Decapitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
79959237939
-
Selective data outsourcing for enforcing privacy
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data outsourcing for enforcing privacy. JCS 19(3), 531-566 (2011)
-
(2011)
JCS
, vol.19
, Issue.3
, pp. 531-566
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
84872227035
-
An OBDD approach to enforce confidentiality and visibility constraints in data publishing
-
Ciriani, V., DeCapitani diVimercati, S., Foresti, S., Livraga, G., Samarati, P.: An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS 20(5), 463-508 (2012)
-
(2012)
JCS
, vol.20
, Issue.5
, pp. 463-508
-
-
Ciriani, V.1
Decapitani Divimercati, S.2
Foresti, S.3
Livraga, G.4
Samarati, P.5
-
13
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexandria, VA, USA (October-November
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proc. of CCS 2006, Alexandria, VA, USA (October-November 2006)
-
(2006)
Proc. Of CCS 2006
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
14
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USAOctober
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
(2003)
Proc. Of CCS 2003
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
84888305233
-
Enforcing dynamic write privileges in data outsourcing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Computers & Security 39, 47-63 (2013)
-
(2013)
Computers &Amp; Security
, vol.39
, pp. 47-63
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
16
-
-
84910146445
-
Fragmentation in presence of data dependencies
-
to appear
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE TDSC (to appear, 2014)
-
(2014)
IEEE TDSC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
17
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1-12:46 (2010)
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
84968747458
-
Integrity for join queries in the cloud
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE TCC 1(2), 187-200 (2013)
-
(2013)
IEEE TCC
, vol.1
, Issue.2
, pp. 187-200
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
19
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, USAJune
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011, Minneapolis, MN, USA (June 2011)
-
(2011)
Proc. Of ICDCS 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
20
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
Cork, IrelandOctober
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of CRiSIS 2012, Cork, Ireland (October 2012)
-
(2012)
Proc. Of Crisis 2012
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
21
-
-
84883985628
-
Protecting data in outsourcing scenarios
-
Das, S., Kant, K., Zhang, N. (eds.)
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Protecting data in outsourcing scenarios. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann (2012)
-
(2012)
Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
22
-
-
84929936983
-
Selective and fine-grained access to data in the cloud
-
Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.), Springer
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. Springer (2014)
-
(2014)
Secure Cloud Computing
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
23
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy, May
-
Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)
-
(2005)
Proc. Of Robocare Workshop 2005
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
24
-
-
77954592905
-
Fully homomorphic encryption using ideal lattices
-
Bethesda, MA, USAMay
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009, Bethesda, MA, USA (May 2009)
-
(2009)
Proc. Of STOC 2009
-
-
Gentry, C.1
-
25
-
-
85025833636
-
-
Goh, E.J.: Secure indexes. Tech. Rep. 2003/216, Cryptology ePrint Archive (2003)
-
Goh, E.J.: Secure indexes. Tech. Rep. 2003/216, Cryptology ePrint Archive (2003), http://eprint.iacr.org?
-
-
-
-
26
-
-
0036204131
-
Providing database as a service
-
San Jose, CA, USAFebruary
-
Hacigümüs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002, San Jose, CA, USA (February 2002)
-
(2002)
Proc. Of ICDE 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
27
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.), Springer, Heidelberg
-
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125-136. Springer, Heidelberg (2004)
-
(2004)
DASFAA 2004. LNCS
, vol.2973
, pp. 125-136
-
-
Hacıgümüş, H.1
Iyer, B.2
Mehrotra, S.3
-
28
-
-
85088717937
-
Fault tolerance management in IaaS clouds
-
Rome, Italy, October
-
Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012, Rome, Italy (October 2012)
-
(2012)
Proc. Of ESTEL 2012
-
-
Jhawar, R.1
Piuri, V.2
-
29
-
-
84883954888
-
Fault tolerance and resilience in cloud computing environments
-
Vacca, J. (ed.), 2nd edn, Morgan Kaufmann
-
Jhawar, R., Piuri, V.: Fault tolerance and resilience in cloud computing environments. In: Vacca, J. (ed.) Computer and Information Security Handbook, 2nd edn., pp. 125-141. Morgan Kaufmann (2013)
-
(2013)
Computer and Information Security Handbook
, pp. 125-141
-
-
Jhawar, R.1
Piuri, V.2
-
30
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, CyprusDecember
-
Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012, Paphos, Cyprus (December 2012)
-
(2012)
Proc. Of CSE 2012
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
32
-
-
84901660441
-
Data security and privacy in the cloud
-
In: Huang, X., Zhou, J. (eds.), Springer, Heidelberg
-
Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28-41. Springer, Heidelberg (2014)
-
(2014)
ISPEC 2014. LNCS
, vol.8434
, pp. 28-41
-
-
Samarati, P.1
-
34
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23(8), 1467-1479 (2012)
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
35
-
-
77749250556
-
Efficient secure query evaluation over encrypted XML databases
-
Seoul, Korea, September
-
Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006, Seoul, Korea (September 2006)
-
(2006)
Proc. Of VLDB 2006
-
-
Wang, H.1
Lakshmanan, L.2
-
36
-
-
84873879352
-
Securing the Cloud: Cloud Computer Security Techniques and Tactics
-
Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress (2011)
-
(2011)
Syngress
-
-
Winkler, V.1
|