-
1
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
: Stern, J. (ed.), Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.A.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.A.3
-
2
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
Austria, September
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of VLDB, Vienna, Austria, September 2007
-
(2007)
Proceedings of VLDB, Vienna
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
3
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1-12:46 (2010)
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
4
-
-
80955143483
-
Private data indexes for selective access to outsourced data
-
Chicago, IL, October
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private data indexes for selective access to outsourced data. In: Proceedings of WPES 2011, Chicago, IL, October 2011
-
(2011)
Proceedings of WPES 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, June
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proceedings of ICDCS, Minneapolis, MN, June 2011
-
(2011)
Proceedings of ICDCS
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
6
-
-
84881468744
-
Supporting concurrency and multiple indexes in private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency and multiple indexes in private access to outsourced data. JCS 21(3), 425-461 (2013)
-
(2013)
JCS
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
7
-
-
84946561014
-
Shuffle index: Efficient and private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Shuffle index: efficient and private access to outsourced data. ACM TOS 11(4), 19:1-19:55 (2015)
-
(2015)
ACM TOS
, vol.11
, Issue.4
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
8
-
-
85048246767
-
Three-server swapping for access confidentiality
-
pre-print
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Three-server swapping for access confidentiality. IEEE TCC (2016). pre-print
-
(2016)
IEEE TCC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
9
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Alexandria, VA, October-November
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of CCS, Alexandria, VA, October-November 2006
-
(2006)
Proceedings of CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI, June
-
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD, Madison, WI, June 2002
-
(2002)
Proceedings of SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
11
-
-
85088717937
-
Fault tolerance management in IaaS clouds
-
Italy, October
-
Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proceedings of ESTEL. Rome, Italy, October 2012
-
(2012)
Proceedings of ESTEL. Rome
-
-
Jhawar, R.1
Piuri, V.2
-
12
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Cyprus, December
-
Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proceedings of CSE. Paphos, Cyprus, December 2012
-
(2012)
Proceedings of CSE. Paphos
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
13
-
-
33646382224
-
Hiding traversal of tree structured data from untrusted data stores
-
Portugal, April
-
Lin, P., Candan, K.: Hiding traversal of tree structured data from untrusted data stores. In: Proceedings of WOSIS, Porto, Portugal, April 2004
-
(2004)
Proceedings of WOSIS, Porto
-
-
Lin, P.1
Candan, K.2
-
14
-
-
38049002436
-
A survey of single-database private information retrieval: Techniques and applications
-
Okamoto, T.,Wang, X. (eds.), Springer, Heidelberg
-
Ostrovsky, R., Skeith III W.E.: A survey of single-database private information retrieval: techniques and applications. In: Okamoto, T.,Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393-411. Springer, Heidelberg (2007)
-
(2007)
PKC 2007. LNCS
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
15
-
-
84951994695
-
Cloud security: Issues and concerns
-
Murugesan, S., Bojanova, I. (eds.)
-
Samarati, P., De Capitani di Vimercati, S.: Cloud security: issues and concerns. In: Murugesan, S., Bojanova, I. (eds.) Encyclopedia on Cloud Computing. Wiley (2016)
-
(2016)
Encyclopedia on Cloud Computing. Wiley
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
16
-
-
84881250193
-
ObliviStore: High performance oblivious cloud storage
-
San Francisco, CA, May
-
Stefanov, E., Shi, E.: ObliviStore: high performance oblivious cloud storage. In: Proceedings of IEEE S&P, San Francisco, CA, May 2013
-
(2013)
Proceedings of IEEE S&P
-
-
Stefanov, E.1
Shi, E.2
-
17
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
Berlin, Germany, November
-
Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of CCS, Berlin, Germany, November 2013
-
(2013)
Proceedings of CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
18
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23(8), 1467-1479 (2012)
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
19
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandria, VA, October
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proceedings of CCS, Alexandria, VA, October 2008
-
(2008)
Proceedings of CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
|