메뉴 건너뛰기




Volumn , Issue , 2006, Pages 98-

Anti-Tamper databases: Processing aggregate queries over encrypted databases

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTER ARCHITECTURE; CRYPTOGRAPHY; QUERY LANGUAGES; TECHNICAL PRESENTATIONS;

EID: 84991010622     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2006.30     Document Type: Conference Paper
Times cited : (27)

References (13)
  • 1
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali, "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits". SIAM Journal on Computing. 3: 850-864, 1984.
    • (1984) SIAM Journal on Computing , vol.3 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 3
    • 85156635541 scopus 로고    scopus 로고
    • Ph.D. Thesis at Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland Ohio U.S.A. September, Available at
    • Sun S. Chung, "Anti-Tamper Databases: Querying Encrypted Databases", Ph.D. Thesis at Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland Ohio U.S.A., September 2005. Available at http://eecs.case.edu/chung/.
    • (2005) Anti-Tamper Databases: Querying Encrypted Databases
    • Chung, S.S.1
  • 4
    • 0002275623 scopus 로고
    • Of nest and trees: A unified approach to proceeding queries that contain nested subqueries, aggregates, and quantifiers
    • Brighton
    • U. Dayal, "Of Nest and Trees: A Unified Approach to Proceeding Queries That Contain Nested Subqueries, Aggregates, and Quantifiers", in the Proceedings of the 13th VLDB, Brighton, 1987.
    • (1987) The Proceedings of the 13th VLDB
    • Dayal, U.1
  • 5
    • 0040746831 scopus 로고    scopus 로고
    • Orthogonal optimization of subqueries and aggregation
    • Santa Barbara, California, May
    • C. A. Galindo-Legaria, M. M. Joshi, "Orthogonal Optimization of Subqueries and Aggregation", in the Proceedings of ACM SIGMOD, Santa Barbara, California, May 2001.
    • (2001) The Proceedings of ACM SIGMOD
    • Galindo-Legaria, C.A.1    Joshi, M.M.2
  • 7
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison
    • Hakan Hacigumus, Balakrishna R. Iyer, Li Chen, Sharad Mehrotra, "Executing SQL over Encrypted Data in the Database-Service-Provider Model", In Proceedings of ACM SIGMOD, Madison, 2002.
    • (2002) Proceedings of ACM SIGMOD
    • Hacigumus, H.1    Iyer, B.R.2    Chen, L.3    Mehrotra, S.4
  • 8
    • 84990954244 scopus 로고    scopus 로고
    • Security vulnerabilities and conflicts of interest in the provider- clearinghouse∗-payer model
    • Stanford, May
    • B. Kiraly, A. Podgrusky, and S. Hoffman, "Security Vulnerabilities and Conflicts of Interest in the Provider- Clearinghouse∗-Payer Model", In the PORTIA Workshop, Stanford, May, 2004.
    • (2004) The PORTIA Workshop
    • Kiraly, B.1    Podgrusky, A.2    Hoffman, S.3
  • 9
    • 0020182801 scopus 로고
    • On optimizing an SQL-like nested query
    • W. Kim. On Optimizing an SQL-like Nested Query. ACM Transaction on Databases Systems, 7(3): 443-469, 1982.
    • (1982) ACM Transaction on Databases Systems , vol.7 , Issue.3 , pp. 443-469
    • Kim, W.1
  • 10
    • 0036361163 scopus 로고    scopus 로고
    • Skew handling techniques in sort-merge join
    • Madison Wisconsin, June
    • W. Li, D. Gao, and R. Snodgrass, "Skew Handling Techniques in Sort-Merge Join", In Proceedings of ACM SIGMOD, Madison Wisconsin, June 2002.
    • (2002) Proceedings of ACM SIGMOD
    • Li, W.1    Gao, D.2    Snodgrass, R.3
  • 12
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • in R. A. DeMillo et al. eds., Academic Press, N.Y.C
    • R. L. Rivest, L. Adleman and M.L. Dertouzos, On data banks and privacy homomorphisms, in R. A. DeMillo et al., eds., Foundations of Secure Computation, pp169- 179, Academic Press, N.Y.C, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.