메뉴 건너뛰기




Volumn 9781461492788, Issue , 2014, Pages 123-148

Selective and fine-grained access to data in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD SERVERS; CONTROL ACCESS; FINE GRAINED; PRIVACY PROBLEMS; PROBLEMS AND CHALLENGES; RESEARCH RESULTS; SECURITY AND PRIVACY; SECURITY PROBLEMS;

EID: 84929936983     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-9278-8_6     Document Type: Chapter
Times cited : (18)

References (53)
  • 5
    • 78649257622 scopus 로고    scopus 로고
    • Minimizing disclosure of private information in credential-based interactions: A graph-based approach
    • Minneapolis, MN, USA, August
    • Ardagna, C.A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In: Proc. of PASSAT 2010. Minneapolis, MN, USA (August 2010)
    • (2010) Proc. of PASSAT 2010
    • Ardagna, C.A.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Paraboschi, S.4    Samarati, P.5
  • 10
    • 60349128962 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • January
    • Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM TISSEC 12(3), 18:1-18:43 (January 2009)
    • (2009) ACM TISSEC , vol.12 , Issue.3 , pp. 181-1843
    • Atallah, M.1    Blanton, M.2    Fazio, N.3    Frikken, K.4
  • 11
    • 84948745350 scopus 로고    scopus 로고
    • On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard
    • San Jose CA USA July
    • Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard. In: Proc. of ASAP 2002. San Jose, CA, USA (July 2002)
    • (2002) Proc. of ASAP 2002
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Maistri, P.4    Piuri, V.5
  • 12
    • 85192431126 scopus 로고    scopus 로고
    • Efficient multi-dimensional key management in broadcast services
    • Athens, Grece September
    • Blanton, M., Frikken, K.: Efficient multi-dimensional key management in broadcast services. In: Proc. of ESORICS 2010. Athens, Grece (September 2010)
    • (2010) Proc. of ESORICS 2010
    • Blanton, M.1    Frikken, K.2
  • 13
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the Web. JCS 10(3), 241-272 (2002)
    • (2002) JCS , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 14
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Warsaw, Poland May
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Proc. of EUROCRYPT 2003. Warsaw, Poland (May 2003)
    • (2003) Proc. of EUROCRYPT 2003
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 15
    • 52649085759 scopus 로고    scopus 로고
    • Querying data under access limitations
    • Cancun, Mexico April
    • Calì, A., Martinenghi, D.: Querying data under access limitations. In: Proc. of ICDE 2008. Cancun, Mexico (April 2008)
    • (2008) Proc. of ICDE 2008
    • Calì, A.1    Martinenghi, D.2
  • 16
    • 0013175080 scopus 로고    scopus 로고
    • An efficient system for non-Transferable anonymous credentials with optional anonymity revocation
    • Innsbruck, Austria May
    • Camenisch, J., Lysyanskaya, A.: An efficient system for non-Transferable anonymous credentials with optional anonymity revocation. In: Proc. of EUROCRYPT 2001. Innsbruck, Austria (May 2001)
    • (2001) Proc. of EUROCRYPT 2001
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 60649105959 scopus 로고    scopus 로고
    • Privacy-Aware biometrics: Design and implementation of a multimodal verification system
    • Anaheim CA USA December
    • Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-Aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008. Anaheim, CA, USA (December 2008)
    • (2008) Proc. of ACSAC 2008
    • Cimato, S.1    Gamassi, M.2    Piuri, V.3    Sassi, R.4    Scotti, F.5
  • 25
    • 79958034128 scopus 로고    scopus 로고
    • Fragments and loose associations: Respecting privacy in data publishing
    • September
    • De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370-1381 (September 2010)
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 1370-1381
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 32
    • 77954592905 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Bethesda MA USA May
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009. Bethesda, MA, USA (May 2009)
    • (2009) Proc. of STOC 2009
    • Gentry, C.1
  • 33
    • 84904329628 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious ram simulation
    • Kyoto, Japan January
    • Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless Oblivious RAM simulation. In: Proc. of SODA 2012. Kyoto, Japan (January 2012)
    • (2012) Proc. of SODA 2012
    • Goodrich, M.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 35
    • 84967222929 scopus 로고    scopus 로고
    • Ensuring integrity of encrypted databases in database as a service model
    • Estes Park CO USA August
    • Hacigümüs, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: Proc. of DBSec 2003. Estes Park, CO, USA (August 2003)
    • (2003) Proc. of DBSec 2003
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3
  • 36
    • 16644385952 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • Jeju Island, Korea March
    • Hacigümüs, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Proc. of DASFAA 2004. Jeju Island, Korea (March 2004)
    • (2004) Proc. of DASFAA 2004
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3
  • 37
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • Madison WI USA June
    • Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD 2002. Madison, WI, USA (June 2002)
    • (2002) Proc. of SIGMOD 2002
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 38
    • 85088717937 scopus 로고    scopus 로고
    • Fault tolerance management in iaas clouds
    • Rome, Italy October
    • Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012. Rome, Italy (October 2012)
    • (2012) Proc. of ESTEL 2012
    • Jhawar, R.1    Piuri, V.2
  • 39
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, Cyprus December
    • Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012. Paphos, Cyprus (December 2012)
    • (2012) Proc. of CSE 2012
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 40
    • 84883935872 scopus 로고    scopus 로고
    • Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations
    • Auckland, New Zealand August
    • Kärger, P., Olmedilla, D., Balke,W.T.: Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations. In: Proc. of SDM 2008. Auckland, New Zealand (August 2008)
    • (2008) Proc. of SDM 2008
    • Kärger, P.1    Olmedilla, D.2    Balke, W.T.3
  • 41
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Chicago IL USA June
    • Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of SIGMOD 2006. Chicago, IL, USA (June 2006)
    • (2006) Proc. of SIGMOD 2006
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 42
    • 85128992094 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany September
    • Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB 2003. Berlin, Germany (September 2003)
    • (2003) Proc. of VLDB 2003
    • Miklau, G.1    Suciu, D.2
  • 43
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • May
    • Mykletun, E., Narasimha,M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS 2(2), 107-138 (May 2006)
    • (2006) ACM TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 44
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • Beijing, China April
    • Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proc. of ASIACCS 2010. Beijing, China (April 2010)
    • (2010) Proc. of ASIACCS 2010
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 45
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted xml databases
    • Seoul, Korea September
    • Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006. Seoul, Korea (September 2006)
    • (2006) Proc. of VLDB 2006
    • Wang, H.1    Lakshmanan, L.2
  • 46
    • 70349251911 scopus 로고    scopus 로고
    • Dual encryption for query integrity assurance
    • Napa Valley CA USA October
    • Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proc. of CIKM 2008. Napa Valley, CA, USA (October 2008)
    • (2008) Proc. of CIKM 2008
    • Wang, H.1    Yin, J.2    Perng, C.3    Yu, P.4
  • 47
    • 84869381921 scopus 로고    scopus 로고
    • Single round access privacy on outsourced storage
    • Raleigh, NC, USA October
    • Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proc. of CCS 2012. Raleigh, NC, USA (October 2012)
    • (2012) Proc. of CCS 2012
    • Williams, P.1    Sion, R.2
  • 48
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandria VA USA October
    • Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: Proc. of CCS 2008. Alexandria, VA, USA (October 2008)
    • (2008) Proc. of CCS 2008
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 49
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • February
    • Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM TON 8(1), 16-30 (February 2000)
    • (2000) IEEE/ACM TON , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 50
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • Vienna, Austria September
    • Xie, M.,Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of VLDB 2007. Vienna, Austria (September 2007)
    • (2007) Proc. of VLDB 2007
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 51
    • 43349091759 scopus 로고    scopus 로고
    • Providing freshness guarantees for outsourced databases
    • Nantes, France March
    • Xie,M.,Wang, H., Yin, J.,Meng, X.: Providing freshness guarantees for outsourced databases. In: Proc. of EDBT 2008. Nantes, France (March 2008)
    • (2008) Proc. of EDBT 2008
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 52
    • 70849087019 scopus 로고    scopus 로고
    • Authenticated join processing in outsourced databases
    • Providence RI USA June-July
    • Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: Proc. of SIGMOD 2009. Providence, RI, USA (June-July 2009)
    • (2009) Proc. of SIGMOD 2009
    • Yang, Y.1    Papadias, D.2    Papadopoulos, S.3    Kalnis, P.4
  • 53
    • 56349121668 scopus 로고    scopus 로고
    • Private information: To reveal or not to reveal
    • October
    • Yao, D., Frikken, K., Atallah, M., Tamassia, R.: Private information: To reveal or not to reveal. ACM TISSEC 12(1), 1-27 (October 2008)
    • (2008) ACM TISSEC , vol.12 , Issue.1 , pp. 1-27
    • Yao, D.1    Frikken, K.2    Atallah, M.3    Tamassia, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.