메뉴 건너뛰기




Volumn , Issue , 2004, Pages 720-731

A Privacy-Preserving Index for Range Queries

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85065578926     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-012088469-8.50064-4     Document Type: Chapter
Times cited : (328)

References (34)
  • 1
    • 85136075198 scopus 로고    scopus 로고
    • An implementable scheme for Secure Delegation of Computing and Data
    • D.-F. J. Domingo-Ferrer and R.X.S. Castillo (1997) An implementable scheme for Secure Delegation of Computing and Data. ICICS 445-451.
    • (1997) ICICS , pp. 445-451
    • J., D.-F.1    Castillo, R.X.S.2
  • 2
    • 85136019842 scopus 로고    scopus 로고
    • Privacy reserving mining of association rules
    • SIGKDD
    • E. A. Evfimievski, R. Srikant, A. Agrawal and J. Gehrke (2002) Privacy reserving mining of association rules. SIGKDD
    • (2002)
    • A., E.1    Srikant, R.2    Agrawal, A.3    Gehrke, J.4
  • 4
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over Encrypted Data in the Database Service Provider Model
    • Madison, Wisconsin, USA, , June 4–6
    • H. Hacigumus, B. Iyer, C. Li and S. Mehrotra (2002, June 4–6) Executing SQL over Encrypted Data in the Database Service Provider Model. Madison, Wisconsin, USA SIGMOD
    • (2002) SIGMOD
    • Hacigumus, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 5
    • 33745623486 scopus 로고    scopus 로고
    • Efficient Execution of Aggregation Queries over Encypted Relational Databases
    • H. Hacigumus, B. Iyer and S. Mehrotra (2004) Efficient Execution of Aggregation Queries over Encypted Relational Databases. DASFAA 125-136.
    • (2004) DASFAA , pp. 125-136
    • Hacigumus, H.1    Iyer, B.2    Mehrotra, S.3
  • 6
    • 16644396185 scopus 로고    scopus 로고
    • Chip-Secured Data Access: Confidential Data on Untrusted Servers
    • L. Bouganim and L. Pucheral (2002) Chip-Secured Data Access: Confidential Data on Untrusted Servers. Proc. of the 28th VLDB Conference
    • (2002) th VLDB Conference
    • Bouganim, L.1    Pucheral, L.2
  • 7
    • 84968422314 scopus 로고    scopus 로고
    • How to build a Trusted Database System on Unstrusted Storage
    • U. Maheshwari, R. Vingralek and W. Shapiro (2000) How to build a Trusted Database System on Unstrusted Storage. OSDI
    • (2000) OSDI
    • Maheshwari, U.1    Vingralek, R.2    Shapiro, W.3
  • 8
    • 85136029414 scopus 로고    scopus 로고
    • Querying Encrypted XML document technical report TR-DB-04-03
    • R. Jammalamadaka and S. Mehrotra Querying Encrypted XML document technical report TR-DB-04-03. http://www.db.ics.uci.edu/pages/publications/index.shtml
    • Jammalamadaka, R.1    Mehrotra, S.2
  • 10
    • 0034827009 scopus 로고    scopus 로고
    • On the Design and Quantification of Privacy Preserving Data Mining Algorithms
    • D. Agrawal and C.C. Aggarwal (2001) On the Design and Quantification of Privacy Preserving Data Mining Algorithms. PODS
    • (2001) PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 11
    • 85136011229 scopus 로고    scopus 로고
    • A Privacy-Preserving Index for Range Queries technical report TR-DB-04-04
    • B. Hore, S. Mehrotra and G. Tsudik A Privacy-Preserving Index for Range Queries technical report TR-DB-04-04. http://www.db.ics.uci.edu/pages/publications/index.shtml
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 12
    • 85136007877 scopus 로고    scopus 로고
    • Lindell, Y., Pinkas, B. Privacy Preserving Data mining. In Advances in Cryptology-CRYPTO 2000, pp. 36–54.
    • Lindell, Y., Pinkas, B. Privacy Preserving Data mining. In Advances in Cryptology-CRYPTO 2000, pp. 36–54.
  • 13
    • 85136007637 scopus 로고    scopus 로고
    • Distributed EM clustering without sharing local information
    • Feb
    • x. Lin and C. Clifton (Feb 2003) Distributed EM clustering without sharing local information. Journal of Information sciences
    • (2003) Journal of Information sciences
    • Lin, x.1    Clifton, C.2
  • 14
    • 0003483188 scopus 로고    scopus 로고
    • Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression
    • SRI International
    • P. Samarati and L. Sweeney (1998) Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression. Technical Report SRI International
    • (1998) Technical Report
    • Samarati, P.1    Sweeney, L.2
  • 15
    • 85135995073 scopus 로고    scopus 로고
    • Meyerson, A., Williams R. General k-anonymization is Hard. Tech-report CMU-CS-03-113.
    • Meyerson, A., Williams R. General k-anonymization is Hard. Tech-report CMU-CS-03-113.
  • 16
    • 0004025372 scopus 로고    scopus 로고
    • Statistical Disclosure control in Practice
    • Springer-Verlag
    • L. Willenborg and T. De Waal (1996) Statistical Disclosure control in Practice. Springer-Verlag
    • (1996)
    • Willenborg, L.1    De Waal, T.2
  • 18
    • 85136028260 scopus 로고    scopus 로고
    • Corel Image Features database, UCI-KDD Archive.
    • Corel Image Features database, UCI-KDD Archive.
  • 22
    • 0021622802 scopus 로고
    • The Statistical Security of a Statistical Database
    • J.F. Traub, T. Yemini and H. Wozniakowski (1984) The Statistical Security of a Statistical Database. TODS 672-679.
    • (1984) TODS , pp. 672-679
    • Traub, J.F.1    Yemini, T.2    Wozniakowski, H.3
  • 23
    • 0020313372 scopus 로고
    • Statistical Databases: Characteristics, Problems, and some Solutions
    • A. Shoshani (1982) Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 208-222.
    • (1982) VLDB , pp. 208-222
    • Shoshani, A.1
  • 24
    • 0346396080 scopus 로고    scopus 로고
    • Security of Random Data Perturbation Methods
    • K. Muralidhar and R. Sarathy (2000) Security of Random Data Perturbation Methods. TODS 487-493.
    • (2000) TODS , pp. 487-493
    • Muralidhar, K.1    Sarathy, R.2
  • 25
    • 84982433444 scopus 로고
    • A study in protection of statistical databases
    • C.T. Yu and F.Y. Chin (1977) A study in protection of statistical databases. SIGMOD 169-181.
    • (1977) SIGMOD , pp. 169-181
    • Yu, C.T.1    Chin, F.Y.2
  • 26
    • 85135989044 scopus 로고    scopus 로고
    • Lunt, T. Access control policies for database systems. In Database Security II: Status and prospects, pp. 41–52.
    • Lunt, T. Access control policies for database systems. In Database Security II: Status and prospects, pp. 41–52.
  • 27
    • 85136027636 scopus 로고    scopus 로고
    • Farkas, C., Jajodia, S. The Inference Problem: A Survey. SIGKDD Explorations, Newsletter, Vol 4, 6–11.
    • Farkas, C., Jajodia, S. The Inference Problem: A Survey. SIGKDD Explorations, Newsletter, Vol 4, 6–11.
  • 28
    • 0030681774 scopus 로고    scopus 로고
    • Catalytic inference analysis: Detecting inference threats due to knowledge discovery
    • Catalytic inference analysis: Detecting inference threats due to knowledge discovery. the IEEE Symposium on security and Privacy 188-199.
    • (1997) the IEEE Symposium on security and Privacy , pp. 188-199
  • 29
    • 85136016002 scopus 로고    scopus 로고
    • Thuraisingham, B. The use of conceptual structures for handling the inference problem. In Database Security V, pp. 333–362.
    • Thuraisingham, B. The use of conceptual structures for handling the inference problem. In Database Security V, pp. 333–362.
  • 31
    • 0034819287 scopus 로고    scopus 로고
    • Optimal and Approximate Computation of Summary Statistics for Range Aggregates
    • A.C. Gilbert, Y. Kotidis, S. Muthukrishnan and M.J. Strauss (2001) Optimal and Approximate Computation of Summary Statistics for Range Aggregates. PODS 227-236.
    • (2001) PODS , pp. 227-236
    • Gilbert, A.C.1    Kotidis, Y.2    Muthukrishnan, S.3    Strauss, M.J.4
  • 32
    • 0039253731 scopus 로고    scopus 로고
    • Approximating Multi-dimensional Aggregate Range Queries over Real Attributes
    • D. Gunopulos, G. Kollios and V.J. Tsotras (2000) Approximating Multi-dimensional Aggregate Range Queries over Real Attributes. ACM-SIMOD 463-474.
    • (2000) ACM-SIMOD , pp. 463-474
    • Gunopulos, D.1    Kollios, G.2    Tsotras, V.J.3
  • 33
    • 0034826134 scopus 로고    scopus 로고
    • STHoles: a multi-dimensional workload aware histogram
    • N. Bruno, S. Chaudhuri and L. Gravano (2001) STHoles: a multi-dimensional workload aware histogram. ACM SIGMOD 211-222.
    • (2001) ACM SIGMOD , pp. 211-222
    • Bruno, N.1    Chaudhuri, S.2    Gravano, L.3
  • 34
    • 85135989430 scopus 로고    scopus 로고
    • Cormen, T., H., Leiserson, C., E., Rivest, R., L. Introduction to Algorithms, MIT Press.
    • Cormen, T., H., Leiserson, C., E., Rivest, R., L. Introduction to Algorithms, MIT Press.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.