-
1
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, USA, Jun
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Efficient and private access to outsourced data," in Proc. 31st Int. Conf. Distrib. Comput. Syst., Minneapolis, MN, USA, Jun. 2011, pp. 710-719.
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst.
, pp. 710-719
-
-
De Capitanidi, V.S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
2
-
-
84899006582
-
Inference attack against encrypted range queries on outsourced databases
-
San Antonio, TX, USA, Mar
-
M. Islam, M. Kuzu, and M. Kantarcioglu, "Inference attack against encrypted range queries on outsourced databases," in Proc. 4th ACM Conf. Data Appl. Security Privacy, San Antonio, TX, USA, Mar. 2014, pp. 235-246.
-
(2014)
Proc. 4th ACM Conf. Data Appl. Security Privacy
, pp. 235-246
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
3
-
-
84878298643
-
Enhancing access privacy of range retrievals over B+-trees
-
Jul
-
H. Pang, J. Zhang, and K. Mouratidis, "Enhancing access privacy of range retrievals over B+-trees," IEEE Trans. Knowl. Data Eng., vol. 25, no. 7, pp. 1533-1547, Jul. 2013.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.7
, pp. 1533-1547
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
4
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China, Apr
-
P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. 5th ACM Symp. Inf., Comput. Commun. Security, Beijing, China, Apr. 2010, pp. 1-14.
-
(2010)
Proc. 5th ACM Symp. Inf., Comput. Commun. Security
, pp. 1-14
-
-
Samarati, P.1
De Capitanidi, V.S.2
-
5
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Combining fragmentation and encryption to protect privacy in data storage," ACM Trans. Inf. Syst. Security, vol. 13, no. 3, pp. 22:1-22:33, 2010.
-
(2010)
ACM Trans. Inf. Syst. Security
, vol.13
, Issue.3
, pp. 221-2233
-
-
Ciriani, V.1
De Capitanidi, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, Cyprus, Dec
-
R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing," in Proc. 15th Int. Conf. Comput. Sci. Eng., Paphos, Cyprus, Dec. 2012, pp. 170-177.
-
(2012)
Proc. 15th Int. Conf. Comput. Sci. Eng.
, pp. 170-177
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
7
-
-
84863337547
-
A review on cloud computing: Design challenges in architecture and security
-
F. Hu, M. Qiu, J. Li, T. Grant, D. Tylor, S. McCaleb, L. Butler, and R. Hamner, "A review on cloud computing: Design challenges in architecture and security," Comput. Inf. Technol., vol. 19, no. 1, pp. 25-55, 2011.
-
(2011)
Comput. Inf. Technol.
, vol.19
, Issue.1
, pp. 25-55
-
-
Hu, F.1
Qiu, M.2
Li, J.3
Grant, T.4
Tylor, D.5
McCaleb, S.6
Butler, L.7
Hamner, R.8
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI, USA, Jun
-
H. Hacig€um€us, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model," in Proc. ACM SIGMOD Int. Conf. Manag. Data, Madison, WI, USA, Jun. 2002, pp. 216-227.
-
(2002)
Proc. ACM SIGMOD Int. Conf. Manag. Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
9
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Process. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Process. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
10
-
-
38049002436
-
A survey of single-database private information retrieval: Techniques and applications
-
Beijing, China, Apr
-
R. Ostrovsky and W. E. Skeith, III, "A survey of single-database private information retrieval: Techniques and applications," in Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography, Beijing, China, Apr. 2007, pp. 393-411.
-
(2007)
Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
11
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Prague, Czech Republic, May
-
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. Int. Conf. Theory Appl. Cryptographic Tech., Prague, Czech Republic, May 1999, pp. 402-414.
-
(1999)
Proc. Int. Conf. Theory Appl. Cryptographic Tech.
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
12
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandria, VA, USA, October
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc. 15th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, October 2008, pp. 139-148.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Security
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
13
-
-
84881250193
-
ObliviStore: High performance oblivious cloud storage
-
San Francisco, CA, USA, May
-
E. Stefanov and E. Shi, "ObliviStore: High performance oblivious cloud storage," in Proc. IEEE Symp. Security Privacy, San Francisco, CA, USA, May 2013, pp. 253-267.
-
(2013)
Proc. IEEE Symp. Security Privacy
, pp. 253-267
-
-
Stefanov, E.1
Shi, E.2
-
14
-
-
84889005645
-
Path ORAM: An extremely simple Oblivious RAM protocol
-
Berlin, Germany, Nov
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path ORAM: An extremely simple Oblivious RAM protocol," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, Berlin, Germany, Nov. 2013, pp. 299-310.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 299-310
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
15
-
-
84904183905
-
The Melbourne shuffle: Improving oblivious storage in the cloud
-
Copenhagen, Denmark, Jul
-
O. Ohrimenko, M. Goodrich, R. Tamassia, and E. Upfal, "The Melbourne shuffle: Improving oblivious storage in the cloud," in Proc. 41st Int. Colloquium Automata, Languages, Program., Copenhagen, Denmark, Jul. 2014, pp. 556-567.
-
(2014)
Proc. 41st Int. Colloquium Automata, Languages, Program.
, pp. 556-567
-
-
Ohrimenko, O.1
Goodrich, M.2
Tamassia, R.3
Upfal, E.4
-
16
-
-
84873955790
-
Distributed oblivious RAM for secure two-party computation
-
Tokyo, Japan, Mar
-
S. Lu and R. Ostrovsky, "Distributed oblivious RAM for secure two-party computation," in Proc. 10th Theory Cryptography Conf., Tokyo, Japan, Mar. 2013, pp. 377-396.
-
(2013)
Proc. 10th Theory Cryptography Conf.
, pp. 377-396
-
-
Lu, S.1
Ostrovsky, R.2
-
17
-
-
84889071325
-
Multi-cloud oblivious storage
-
Berlin, Germany, Nov
-
E. Stefanov and E. Shi, "Multi-cloud oblivious storage," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, Berlin, Germany, Nov. 2013, pp. 247-258.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 247-258
-
-
Stefanov, E.1
Shi, E.2
-
18
-
-
33646382224
-
Hiding traversal of tree structured data from untrusted data stores
-
Porto, Portugal, Apr
-
P. Lin and K. Candan, "Hiding traversal of tree structured data from untrusted data stores," in Proc. 2nd Int. Workshop Security Inf. Syst., Porto, Portugal, Apr. 2004, pp. 314-323.
-
(2004)
Proc. 2nd Int. Workshop Security Inf. Syst.
, pp. 314-323
-
-
Lin, P.1
Candan, K.2
-
19
-
-
80053005931
-
A light-weight solution to preservation of access pattern privacy in un-trusted clouds
-
Leuven, Belgium, Sep
-
K. Yang, J. Zhang, W. Zhang, and D. Qiao, "A light-weight solution to preservation of access pattern privacy in un-trusted clouds," in Proc. 16th Eur. Symp. Res. Comput. Security, Leuven, Belgium, Sep. 2011, pp. 528-547.
-
(2011)
Proc. 16th Eur. Symp. Res. Comput. Security
, pp. 528-547
-
-
Yang, K.1
Zhang, J.2
Zhang, W.3
Qiao, D.4
-
20
-
-
84884738971
-
Distributed shuffling for preserving access confidentiality
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Distributed shuffling for preserving access confidentiality," in Proc. 18th Eur. Symp. Res. Comput. Security, Egham, U.K., 2013, pp. 628-645.
-
(2013)
Proc. 18th Eur. Symp. Res. Comput. Security, Egham, U.K.
, pp. 628-645
-
-
De Capitanidi, V.S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
21
-
-
84881468744
-
Supporting concurrency and multiple indexes in private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Supporting concurrency and multiple indexes in private access to outsourced data," J. Comput. Security, vol. 21, no. 3, pp. 425-461, 2013.
-
(2013)
J. Comput. Security
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitanidi, V.S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
22
-
-
84924389886
-
Protecting access confidentiality with data distribution and swapping
-
Sydney, Australia, Dec
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Protecting access confidentiality with data distribution and swapping," in Proc. IEEE 4th Int. Conf. Big Data Cloud Comput., Sydney, Australia, Dec. 2014, pp. 167-174.
-
(2014)
Proc. IEEE 4th Int. Conf. Big Data Cloud Comput.
, pp. 167-174
-
-
De Capitanidi, V.S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
23
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Asilomar, CA, USA, Jan
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, "Two can keep a secret: A distributed architecture for secure database services," presented at the 2nd Biennial Conf. Innovative Data Syst. Res., Asilomar, CA, USA, Jan. 2005.
-
(2005)
The 2nd Biennial Conf. Innovative Data Syst. Res.
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
|