-
1
-
-
84872068962
-
Managing, and accessing data in the cloud: Privacy risks, and approaches
-
Cork, Ireland, October
-
S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Managing, and accessing data in the cloud: Privacy risks, and approaches," in Proc. of CRiSIS, Cork, Ireland, October 2012
-
(2012)
Proc. of CRiSIS
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Samarati, P.4
-
2
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
December
-
R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing," in Proc. of CSE, Paphos, Cyprus, December 2012
-
(2012)
Proc. of CSE, Paphos, Cyprus
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
3
-
-
77951205188
-
A survey of single-database private information retrieval: Techniques, and applications
-
April
-
R. Ostrovsky, and W. E. Skeith, III, "A survey of single-database private information retrieval: Techniques, and applications," in Proc. of PKC, Beijing, China, April 2007
-
(2007)
Proc. of PKC, Beijing, China
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
4
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
May
-
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. of EUROCRYPT, Prague, Czech Republic, May 1999
-
(1999)
Proc. of EUROCRYPT, Prague, Czech Republic
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
5
-
-
84946561014
-
Shuffle index: Efficient, and private access to outsourced data
-
October
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Shuffle index: Efficient, and private access to outsourced data," ACM TOS, vol. 11, no. 4, pp. 19: 1-19: 55, October 2015
-
(2015)
ACM TOS
, vol.11
, Issue.4
, pp. 191-1955
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
6
-
-
84881250193
-
Oblivistore: High performance oblivious cloud storage
-
S& P, San Francisco, CA, May
-
E. Stefanov, and E. Shi, "ObliviStore: High performance oblivious cloud storage," in Proc. of IEEE S& P, San Francisco, CA, May 2013
-
(2013)
Proc. of IEEE
-
-
Stefanov, E.1
Shi, E.2
-
7
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
Berlin, Germany, November
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path ORAM: An extremely simple Oblivious RAM protocol," in Proc. of CCS, Berlin, Germany, November 2013
-
(2013)
Proc. of CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
8
-
-
84910613326
-
Unified oblivious-RAM: Improving recursive ORAM with locality, and pseudorandomness
-
L. Ren, C. W. Fletcher, X. Yu, A. Kwon, M. van Dijk, and S. Devadas, "Unified oblivious-RAM: Improving recursive ORAM with locality, and pseudorandomness," IACR Cryptology ePrint Archive, vol. 205, 2014
-
(2014)
IACR Cryptology EPrint Archive
, vol.205
-
-
Ren, L.1
Fletcher, C.W.2
Yu, X.3
Kwon, A.4
Van Dijk, M.5
Devadas, S.6
-
9
-
-
0022093855
-
Self-adjusting binary search trees
-
Jul
-
D. Sleator, and R. Tarjan, "Self-adjusting binary search trees," J. ACM, vol. 32, no. 3, pp. 652-686, Jul. 1985
-
(1985)
J. ACM
, vol.32
, Issue.3
, pp. 652-686
-
-
Sleator, D.1
Tarjan, R.2
-
10
-
-
0028447111
-
Quickly generating billion-record synthetic databases
-
J. Gray, P. Sundaresan, S. Englert, K. Baclawski, and P. Weinberger, "Quickly generating billion-record synthetic databases," in Proc. of SIGMOD, Minneapolis, MN, 1994
-
(1994)
Proc. of SIGMOD, Minneapolis, MN
-
-
Gray, J.1
Sundaresan, P.2
Englert, S.3
Baclawski, K.4
Weinberger, P.5
-
11
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of SIGMOD, Madison, WI, June 2002
-
(2002)
Proc. of SIGMOD, Madison, WI
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
12
-
-
84863511940
-
Enabling secure, and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure, and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, 2012
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
13
-
-
80051865953
-
Efficient, and private access to outsourced data
-
MN, June
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient, and private access to outsourced data," in Proc. of ICDCS, Minneapolis, MN, June 2011
-
(2011)
Proc. of ICDCS, Minneapolis
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
14
-
-
84881468744
-
Supporting concurrency, and multiple indexes in private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Supporting concurrency, and multiple indexes in private access to outsourced data," JCS, vol. 21, no. 3, pp. 425-461, 2013
-
(2013)
JCS
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
15
-
-
85048246767
-
Three-server swapping for access confidentiality
-
pre-print
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Three-server swapping for access confidentiality," IEEE TCC, 2016, pre-print
-
(2016)
IEEE TCC
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
16
-
-
84928112870
-
Tunably-oblivious memory: Generalizing ORAM to enable privacy-efficiency tradeoffs
-
San Antonio, TX, March
-
J. Dautrich, and C. Ravishankar, "Tunably-oblivious memory: Generalizing ORAM to enable privacy-efficiency tradeoffs," in Proc. of CODASPY, San Antonio, TX, March 2015
-
(2015)
Proc. of CODASPY
-
-
Dautrich, J.1
Ravishankar, C.2
-
17
-
-
33646382224
-
Hiding traversal of tree structured data from untrusted data stores
-
April
-
P. Lin, and K. Candan, "Hiding traversal of tree structured data from untrusted data stores," in Proc. of WOSIS, Porto, Portugal, April 2004
-
(2004)
Proc. of WOSIS, Porto, Portugal
-
-
Lin, P.1
Candan, K.2
-
18
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy, and correctness on untrusted storage
-
October
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy, and correctness on untrusted storage," in Proc. of CCS, Alexandria, VA, October 2008
-
(2008)
Proc. of CCS, Alexandria, VA
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
19
-
-
84954099286
-
Practicing oblivious access on cloud storage: The gap, the fallacy, and the new way forward
-
Denver, CO, October
-
V. Bindschaedler, M. Naveed, X. Pan, X. Wang, and Y. Huang, "Practicing oblivious access on cloud storage: The gap, the fallacy, and the new way forward," in Proc. of CCS, Denver, CO, October 2015
-
(2015)
Proc. of CCS
-
-
Bindschaedler, V.1
Naveed, M.2
Pan, X.3
Wang, X.4
Huang, Y.5
-
20
-
-
85028636425
-
Onion ORAM: A constant bandwidth blowup oblivious RAM
-
January
-
S. Devadas, M. van Dijk, C. W. Fletcher, L. Ren, E. Shi, and D. Wichs, "Onion ORAM: A constant bandwidth blowup oblivious RAM," in Proc. of TCC, Tel Aviv, Israel, January 2016
-
(2016)
Proc. of TCC, Tel Aviv, Israel
-
-
Devadas, S.1
Van Dijk, M.2
Fletcher, C.W.3
Ren, L.4
Shi, E.5
Wichs, D.6
-
21
-
-
84979561697
-
Access control for the shuffle index
-
Trento, Italy, July
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Access control for the shuffle index," in Proc. of DBSec, Trento, Italy, July 2016
-
(2016)
Proc. of DBSec
-
-
De Capitani, S.1
Vimercati, D.2
Foresti, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
|