메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Orthogonal security with cipherbase

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; HARDWARE-SOFTWARE CODESIGN; WINDOWS OPERATING SYSTEM;

EID: 85084014165     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (157)

References (24)
  • 2
    • 79959972183 scopus 로고    scopus 로고
    • TrustedDB: A trusted hardware based database with privacy and data confidentiality
    • S. Bajaj and R. Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, 2011.
    • (2011) SIGMOD
    • Bajaj, S.1    Sion, R.2
  • 3
    • 84881219587 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • A. Boldyreva, N. Chenette, and A. O’Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
    • (2011) CRYPTO
    • Boldyreva, A.1    Chenette, N.2    O’Neill, A.3
  • 4
    • 85072871162 scopus 로고    scopus 로고
    • Dropbox. http://www.dropbox.com.
  • 5
    • 84870691127 scopus 로고    scopus 로고
    • FPGAs for trusted cloud computing
    • K. Eguro and R. Venkatesan. FPGAs for trusted cloud computing. In FPL, 2012.
    • (2012) FPL
    • Eguro, K.1    Venkatesan, R.2
  • 6
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3), 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3
    • Gentry, C.1
  • 7
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. J. ACM, 43(3):431–473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 8
    • 34547970191 scopus 로고    scopus 로고
    • AES on FPGA from the fastest to the smallest
    • T. Good and M. Benaissa. AES on FPGA from the fastest to the smallest. In CHES, 2005.
    • (2005) CHES
    • Good, T.1    Benaissa, M.2
  • 9
    • 79959681766 scopus 로고    scopus 로고
    • Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
    • Michael T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, pages 379–388, 2011.
    • (2011) SPAA , pp. 379-388
    • Goodrich, M.T.1
  • 10
    • 85072865128 scopus 로고    scopus 로고
    • Amazon Web Services LLC. AWS GovCloud. http://aws.amazon.com/govcloud-us/.
    • AWS GovCloud
  • 12
    • 0001890225 scopus 로고
    • The cascades framework for query optimization
    • G. Graefe. The cascades framework for query optimization. IEEE Data Eng. Bull., 18(3), 1995.
    • (1995) IEEE Data Eng. Bull. , vol.18 , Issue.3
    • Graefe, G.1
  • 13
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • H. Hacigümüs, B. R. Iyer, et al. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD, 2002.
    • (2002) SIGMOD
    • Hacigümüs, H.1    Iyer, B.R.2
  • 14
    • 0027621744 scopus 로고
    • Predicate migration: Optimizing queries with expensive predicates
    • J. M. Hellerstein and M. Stonebraker. Predicate migration: Optimizing queries with expensive predicates. In SIGMOD, 1993.
    • (1993) SIGMOD
    • Hellerstein, J.M.1    Stonebraker, M.2
  • 17
    • 0003584029 scopus 로고    scopus 로고
    • National Institute of Standards Information Technology Laboratory and Technology
    • National Institute of Standards Information Technology Laboratory and Technology. Security requirements for cryptographic modules, 2001.
    • (2001) Security Requirements for Cryptographic Modules
  • 18
  • 19
    • 82655162816 scopus 로고    scopus 로고
    • CryptDB: Protecting confidentiality with encrypted query processing
    • R. A. Popa, C. M. S. Redfield, N. Zeldovich, et al. Cryptdb: protecting confidentiality with encrypted query processing. In SOSP, pages 85–100, 2011.
    • (2011) SOSP , pp. 85-100
    • Popa, R.A.1    Redfield, C.M.S.2    Zeldovich, N.3
  • 20
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Radu Sion. Query execution assurance for outsourced databases. In VLDB, 2005.
    • (2005) VLDB
    • Sion, R.1
  • 21
    • 17644364039 scopus 로고    scopus 로고
    • Design and analysis of dual-rail circuits for security applications
    • Danil Sokolov, Julian Murphy, Alexander Bystrov, and Alex Yakovlev. Design and analysis of dual-rail circuits for security applications. IEEE Transactions on Computers, 54:449–460, 2005.
    • (2005) IEEE Transactions on Computers , vol.54 , pp. 449-460
    • Sokolov, D.1    Murphy, J.2    Bystrov, A.3    Yakovlev, A.4
  • 22
    • 80955132243 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • E. Stefanov, E. Shi, and D. Song. Towards Practical Oblivious RAM. CoRR, abs/1106.3652, 2011.
    • (2011) CoRR
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 23
    • 85072860477 scopus 로고    scopus 로고
    • Germany tackles tax evasion
    • Feb 7
    • Germany Tackles Tax Evasion. Wall Street Journal, Feb 7 2010.
    • (2010) Wall Street Journal


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.