-
1
-
-
70249129465
-
Scalable and efficient provable data possession
-
Istanbul, Turkey
-
G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik, Scalable and efficient provable data possession, in: Proc. of SECURECOMM, Istanbul, Turkey, 2008.
-
(2008)
Proc. of SECURECOMM
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.3
Tsudik, G.4
-
2
-
-
84897731945
-
Privacy-preserving collaborative filtering on the cloud and practical implementation experiences
-
Santa Clara, CA
-
A. Basu, J. Vaidya, H. Kikuchi and T. Dimitrakos, Privacy-preserving collaborative filtering on the cloud and practical implementation experiences, in: Proc. of IEEE Cloud, Santa Clara, CA, 2013.
-
(2013)
Proc. of IEEE Cloud
-
-
Basu, A.1
Vaidya, J.2
Kikuchi, H.3
Dimitrakos, T.4
-
3
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, in: Proc. of CCS, Washington, DC, 2003.
-
(2003)
Proc. of CCS
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
4
-
-
84864356094
-
Enforcing subscription-based authorization policies in cloud scenarios
-
Paris, France
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia and G. Livraga, Enforcing subscription-based authorization policies in cloud scenarios, in: Proc. of DBSec, Paris, France, 2012.
-
(2012)
Proc. of DBSec
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
-
5
-
-
84921444021
-
Integrity for distributed queries
-
San Francisco, CA
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati, Integrity for distributed queries, in: Proc. of CNS, San Francisco, CA, 2014.
-
(2014)
Proc. of CNS
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Encryption policies for regulating access to outsourced data, ACM TODS 35(2) (2010), 12:1-12:46.
-
(2010)
ACM TODS
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
84968747458
-
Integrity for join queries in the cloud
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Integrity for join queries in the cloud, IEEE TCC 1(2) (2013), 187-200.
-
(2013)
IEEE TCC
, vol.1
, Issue.2
, pp. 187-200
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
84958530895
-
Optimizing integrity checks for join queries in the cloud
-
Vienna, Austria
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Optimizing integrity checks for join queries in the cloud, in: Proc. of DBSec, Vienna, Austria, 2014.
-
(2014)
Proc. of DBSec
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
84942626377
-
Integrity for approximate joins on untrusted computational servers
-
Hamburg, Germany
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Integrity for approximate joins on untrusted computational servers, in: Proc. of SEC, Hamburg, Germany, 2015.
-
(2015)
Proc. of SEC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
Cork, Ireland
-
S. De Capitani di Vimercati, S. Foresti and P. Samarati, Managing and accessing data in the cloud: Privacy risks and approaches, in: Proc. of CRiSIS, Cork, Ireland, 2012.
-
(2012)
Proc. of CRiSIS
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
11
-
-
84894156359
-
Robust lossless watermarking of relational databases based on circular histogram modulation
-
J. Franco-Contreras, G. Coatrieux, F. Cuppens, N. Cuppens-Boulahia and C. Roux, Robust lossless watermarking of relational databases based on circular histogram modulation, IEEE TIFS 9(3) (2014), 397-410.
-
(2014)
IEEE TIFS
, vol.9
, Issue.3
, pp. 397-410
-
-
Franco-Contreras, J.1
Coatrieux, G.2
Cuppens, F.3
Cuppens-Boulahia, N.4
Roux, C.5
-
12
-
-
84888018311
-
Data integrity evaluation in cloud database-as-a-service
-
Santa Clara, CA
-
P. Ghazizadeh, R. Mukkamala and S. Olariu, Data integrity evaluation in cloud database-as-a-service, in: Proc. of IEEE SERVICES, Santa Clara, CA, 2013.
-
(2013)
Proc. of IEEE SERVICES
-
-
Ghazizadeh, P.1
Mukkamala, R.2
Olariu, S.3
-
13
-
-
84967222929
-
Ensuring integrity of encrypted databases in database as a service model
-
Estes Park, CO
-
H. Hacigümüs, B. Iyer and S. Mehrotra, Ensuring integrity of encrypted databases in database as a service model, in: Proc. of DBSec, Estes Park, CO, 2003.
-
(2003)
Proc. of DBSec
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
14
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI
-
H. Hacigümüş, B. Iyer, S.Mehrotra and C. Li, Executing SQL over encrypted data in the database-service-provider model, in: Proc. of SIGMOD, Madison, WI, 2002.
-
(2002)
Proc. of SIGMOD
-
-
Hacigümüş, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
15
-
-
85088717937
-
Fault tolerance management in IaaS clouds
-
Rome, Italy
-
R. Jhawar and V. Piuri, Fault tolerance management in IaaS clouds, in: Proc. of ESTEL, Rome, Italy, 2012.
-
(2012)
Proc. of ESTEL
-
-
Jhawar, R.1
Piuri, V.2
-
16
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, Cyprus
-
R. Jhawar, V. Piuri and P. Samarati, Supporting security requirements for resource management in cloud computing, in: Proc. of CSE, Paphos, Cyprus, 2012.
-
(2012)
Proc. of CSE
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
17
-
-
84876800484
-
Fault tolerance management in cloud computing: A system-level perspective
-
R. Jhawar, V. Piuri and M. Santambrogio, Fault tolerance management in cloud computing: A system-level perspective, IEEE Systems Journal 7(2) (2013), 288-297.
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.2
, pp. 288-297
-
-
Jhawar, R.1
Piuri, V.2
Santambrogio, M.3
-
18
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
Alexandria, VA
-
A. Juels and B.S. Kaliski Jr., PORs: Proofs of retrievability for large files, in: Proc. of ACM CCS, Alexandria, VA, 2007.
-
(2007)
Proc. of ACM CCS
-
-
Juels, A.1
Kaliski, B.S.2
-
19
-
-
77954696736
-
An evaluation of alternative architectures for transaction processing in the cloud
-
Indianapolis, IN
-
D. Kossmann, T. Kraska and S. Loesing, An evaluation of alternative architectures for transaction processing in the cloud, in: Proc. of SIGMOD, Indianapolis, IN, 2010.
-
(2010)
Proc. of SIGMOD
-
-
Kossmann, D.1
Kraska, T.2
Loesing, S.3
-
20
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, IL
-
F. Li, M. Hadjieleftheriou, G. Kollios and L. Reyzin, Dynamic authenticated index structures for outsourced databases, in: Proc. of SIGMOD, Chicago, IL, 2006.
-
(2006)
Proc. of SIGMOD
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
21
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
F. Li,M. Hadjieleftheriou, G. Kollios and L. Reyzin, Authenticated index structures for aggregation queries, ACM TISSEC 13(4) (2010), 32:1-32:35.
-
(2010)
ACM TISSEC
, vol.13
, Issue.4
, pp. 321-3235
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
22
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha and G. Tsudik, Authentication and integrity in outsourced databases, ACM TOS 2(2) (2006), 107-138.
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
23
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Baltimore, MA
-
H. Pang, A. Jain, K. Ramamritham and K. Tan, Verifying completeness of relational query results in data publishing, in: Proc. of SIGMOD, Baltimore, MA, 2005.
-
(2005)
Proc. of SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
24
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang and Q. Wang, Security challenges for the public cloud, IEEE Internet Computing 16(1) (2012), 69-73.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
25
-
-
84951994695
-
Cloud security: Issues and concerns
-
S. Murugesan and I. Bojanova, eds, Wiley, New York
-
P. Samarati and S. De Capitani di Vimercati, Cloud security: Issues and concerns, in: Encyclopedia on Cloud Computing, S. Murugesan and I. Bojanova, eds, Wiley, New York, 2016.
-
(2016)
Encyclopedia on Cloud Computing
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
26
-
-
84878517199
-
Verifying correctness of inner product of vectors in cloud computing
-
Hangzhou, China
-
G. Sheng, T. Wen, Q. Guo and Y. Yin, Verifying correctness of inner product of vectors in cloud computing, in: Proc. of Cloud Computing, Hangzhou, China, 2013.
-
(2013)
Proc. of Cloud Computing
-
-
Sheng, G.1
Wen, T.2
Guo, Q.3
Yin, Y.4
-
27
-
-
84973476005
-
-
The transaction processing performance council (TPC) benchmark H
-
The transaction processing performance council (TPC) benchmark H, available at: http://www.tpc.org/tpch/.
-
-
-
-
28
-
-
84973472074
-
Correctness verification in outsourced databases: More reliable fake tuples approach
-
Kolkata, India, December
-
G. Umadevi and A. Saxena, Correctness verification in outsourced databases: More reliable fake tuples approach, in: Proc. of ICISS, Kolkata, India, December, 2013.
-
(2013)
Proc. of ICISS
-
-
Umadevi, G.1
Saxena, A.2
-
29
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. Chow, Q. Wang, K. Ren and W. Lou, Privacy-preserving public auditing for secure cloud storage, IEEE Transactions on Computers 62(2) (2013), 362-375.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
30
-
-
70349251911
-
Dual encryption for query integrity assurance
-
Napa Valley, CA
-
H. Wang, J. Yin, C. Perng and P.S. Yu, Dual encryption for query integrity assurance, in: Proc. of CIKM, Napa Valley, CA, 2008.
-
(2008)
Proc. of CIKM
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.S.4
-
31
-
-
84997556980
-
Integrity auditing of outsourced data
-
Vienna, Austria
-
M. Xie, H. Wang, J. Yin and X. Meng, Integrity auditing of outsourced data, in: Proc. of VLDB, Vienna, Austria, 2007.
-
(2007)
Proc. of VLDB
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
32
-
-
43349091759
-
Providing freshness guarantees for outsourced databases
-
Nantes, France
-
M. Xie, H. Wang, J. Yin and X. Meng, Providing freshness guarantees for outsourced databases, in: Proc. of EDBT, Nantes, France, 2008.
-
(2008)
Proc. of EDBT
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
33
-
-
84881101092
-
Authentication of range query results in MapReduce environments
-
Glasgow, UK
-
Z. Yang, S. Gao, J. Xu and B. Choi, Authentication of range query results in MapReduce environments, in: Proc. of CloudDB, Glasgow, UK, 2011.
-
(2011)
Proc. of CloudDB
-
-
Yang, Z.1
Gao, S.2
Xu, J.3
Choi, B.4
-
34
-
-
84878830854
-
Dynamic audit services for outsourced storages in clouds
-
Y. Zhu, G.-J. Ahn, H. Hu, S.S. Yau, H.G. An and C.-J. Hu, Dynamic audit services for outsourced storages in clouds, IEEE TSC 6(2) (2013), 227-238.
-
(2013)
IEEE TSC
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Hu, C.-J.6
|