-
1
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2009.
-
(2009)
ACM SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
2
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, 2012.
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
3
-
-
77949787383
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P, 2000.
-
(2000)
Proc. of S&P
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
4
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," In Proc. of ACM CCS, 2006, pp. 79-88.
-
(2006)
Proc. of ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
5
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L.Varna, S. He, M. Wu, and D. W. Oard, "Confidentiality-preserving rank-ordered search," in Proc. of the 2007 ACM Workshop on Storage Security and Survivability, 2007, pp. 7-12.
-
(2007)
Proc. of the 2007 ACM Workshop on Storage Security and Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
6
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k retrieval from a confidential index," in Proc. of EDBT, 2009, pp. 439-449.
-
(2009)
Proc. of EDBT
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
7
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. of IEEE INFOCOM, 2011.
-
(2011)
Proc. of IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
8
-
-
84877939257
-
Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT. Hou, and H.L, "Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking," in Proc. of ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 71-82.
-
(2013)
Proc. of ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, H.L.Y.T.6
-
9
-
-
80052398037
-
Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
-
M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. of the 31st ICDCSW, 2011, pp. 273-281.
-
(2011)
Proc. of the 31st ICDCSW
, pp. 273-281
-
-
Chuah, M.1
Hu, W.2
-
10
-
-
84876099909
-
Secure rankordered search of multi-keyword trapdoor over encrypted cloud data
-
Ayad Ibrahim, Hai Jin, Ali A. Yassin, and Deqing Zou, "Secure Rankordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data," in Proc. of APSCC, 2012 IEEE Asia-Pacific, pp. 263-270.
-
Proc. of APSCC, 2012 IEEE Asia-Pacific
, pp. 263-270
-
-
Ibrahim, A.1
Jin, H.2
Yassin, A.A.3
Zou, D.4
-
11
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA, March
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. of IEEE INFOCOM'10 Mini-Conference, San Diego, CA, USA, March 2010, pp. 1-5.
-
(2010)
Proc. of IEEE INFOCOM'10 Mini-Conference
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
12
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, "Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data," in Proc. of IEEE INFOCOM, 2012.
-
(2012)
Proc. of IEEE INFOCOM
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Mahendra, K.4
Urs, R.5
-
13
-
-
80051911576
-
Cryptographic cloud storage
-
January, LNCS. Springer, Heidelberg
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in RLCPS, January 2010, LNCS. Springer, Heidelberg.
-
(2010)
RLCPS
-
-
Kamara, S.1
Lauter, K.2
-
14
-
-
84976702763
-
WordNet: A lexical database for English
-
G. A. Miller, "WordNet: a lexical database for English," Communications of the ACM, vol.38, issue 11, pp. 39-41, 1995.
-
(1995)
Communications of the ACM
, vol.38
, Issue.11
, pp. 39-41
-
-
Miller, G.A.1
-
16
-
-
0020277962
-
Multidimensional B-trees for associative searching in database systems
-
P. Scheuermann and M. Ouksel, "Multidimensional B-trees for associative searching in database systems," Information systems, vol. 7, issue 2, pp. 123-137, 1982.
-
(1982)
Information Systems
, vol.7
, Issue.2
, pp. 123-137
-
-
Scheuermann, P.1
Ouksel, M.2
-
17
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC, 2007, pp. 535-554.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
18
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. R. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of ACNS, 2004, pp. 31-45.
-
(2004)
Proc. of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
19
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. of EUROCRYPT, 2008.
-
(2008)
Proc. of EUROCRYPT
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
20
-
-
84860009960
-
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
-
T. Okamoto and K. Takashima, "Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption," in Proc. of EUROCRYPT, 2012, pp. 591-608.
-
(2012)
Proc. of EUROCRYPT
, pp. 591-608
-
-
Okamoto, T.1
Takashima, K.2
-
23
-
-
0032676701
-
OntoSeek: Content-based access to the web
-
N. Guarino, C. Masolo, and G. Verete, "OntoSeek: Content-Based Access to the Web," IEEE Intelligent Systems, vol. 14, no. 3, pp. 70-80, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.3
, pp. 70-80
-
-
Guarino, N.1
Masolo, C.2
Verete, G.3
-
24
-
-
84876519047
-
Semantic similarity methods in wordnet and their application to information retrieval on the web
-
G. Varelas, E. Voutsakis, and P. Raftopoulou, "Semantic Similarity Methods in WordNet and their Application to Information Retrieval on the Web," in Proc. of 7th ACM international workshop on Web information and data management, 2005, pp. 10-16.
-
(2005)
Proc. of 7th ACM International Workshop on Web Information and Data Management
, pp. 10-16
-
-
Varelas, G.1
Voutsakis, E.2
Raftopoulou, P.3
-
25
-
-
25144480175
-
Learning taxonomic relations from heterogeneous sources
-
P. Cimiano, A. Pivk, L. Schmidt-Thieme, and S. Staab, "Learning taxonomic relations from heterogeneous sources," in Proc. of the ECAI 2004 Ontology Learning and Population Workshop, 2004.
-
(2004)
Proc. of the ECAI 2004 Ontology Learning and Population Workshop
-
-
Cimiano, P.1
Pivk, A.2
Schmidt-Thieme, L.3
Staab, S.4
-
29
-
-
84976507752
-
Learning text classifier using the domain concept hierarchy
-
B.B. Wang, R.I. McKay, H.A. Abbass, and M. Barlow, "Learning text classifier using the domain concept hierarchy," in Proc. of IEEE International Conference on Communications, 2002.
-
(2002)
Proc. of IEEE International Conference on Communications
-
-
Wang, B.B.1
McKay, R.I.2
Abbass, H.A.3
Barlow, M.4
-
30
-
-
42549154367
-
Advertising keyword suggestion based on concept hierarchy
-
Y. Chen, G.-R. Xue, and Y. Yu, "Advertising keyword suggestion based on concept hierarchy," in Proc. of WSDM'08, 2008.
-
(2008)
Proc. of WSDM'08
-
-
Chen, Y.1
Xue, G.-R.2
Yu, Y.3
-
31
-
-
0024480920
-
Development and application of a metric on semantic nets
-
R. Rada, H. Mili, E. Bicknell, and M. Blettner, "Development and Application of a Metric on Semantic Nets," IEEE Trans. System, Man, and Cybernetics, vol. 19, pp. 17-30, 1989.
-
(1989)
IEEE Trans. System, Man, and Cybernetics
, vol.19
, pp. 17-30
-
-
Rada, R.1
Mili, H.2
Bicknell, E.3
Blettner, M.4
-
33
-
-
76549097383
-
Measure semantic distance in wordnet based on directed graph search
-
D. Chen, Y. Jianzhuo, F. Liying, and S. Bin, "Measure Semantic Distance in WordNet Based on Directed Graph Search," in Proc. of EEEE'09, 2009, pp. 57-60.
-
(2009)
Proc. of EEEE'09
, pp. 57-60
-
-
Chen, D.1
Jianzhuo, Y.2
Liying, F.3
Bin, S.4
-
34
-
-
84983263826
-
-
ODP, http://www.dmoz.org/Science/.
-
-
-
-
35
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in Proc. of SIGMOD, 2009, pp. 139-152.
-
(2009)
Proc. of SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
37
-
-
78751575843
-
Sabre: A sensitive attribute bucketization and redistribution framework for t-closeness
-
J. Cao, P. Karras, P. Kalnis, and K.-L. Tan, "Sabre: a sensitive attribute bucketization and redistribution framework for t-closeness," VLDB J., vol. 20, no. 1, pp. 59-81, 2011.
-
(2011)
VLDB J.
, vol.20
, Issue.1
, pp. 59-81
-
-
Cao, J.1
Karras, P.2
Kalnis, P.3
Tan, K.-L.4
-
38
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," IEEE Trans. on Parallel and Dist. Systems, DOI: 10.1109/TPDS. 2015.2506573.
-
IEEE Trans. on Parallel and Dist. Systems
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
39
-
-
84881354487
-
Secure nearest neighbor revisited
-
B. Yao, F. Li, X. Xiao, "Secure nearest neighbor revisited," in Proc. of ICDE 2013, PP. 733-744.
-
(2013)
Proc. of ICDE
, pp. 733-744
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
40
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, Ma. Rosu, M. Steiner, "Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries," in Proc. of CRYPTO 2013, pp. 353-373.
-
(2013)
Proc. of CRYPTO
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, Ma.5
Steiner, M.6
-
41
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu,"Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing," IEICE Transactions on Communications, 2015, vol. E98-B, no. 1, pp.190-200.
-
(2015)
IEICE Transactions on Communications
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
42
-
-
84914148700
-
Blind seer: A searchable private DBMS
-
V. Pappas, F. Krell, B. Vo, V. Kolesnikov, T. Malkin, S. G. Choi, W. George, A. Keromytis, and S. Bellovin, "Blind Seer: A Searchable Private DBMS," in Proc. of IEEE S&P 2014, pp. 359-374.
-
(2014)
Proc. of IEEE S&P
, pp. 359-374
-
-
Pappas, V.1
Krell, F.2
Vo, B.3
Kolesnikov, V.4
Malkin, T.5
Choi, S.G.6
George, W.7
Keromytis, A.8
Bellovin, S.9
|