-
3
-
-
85180631745
-
-
Amazon Web Services. Online at
-
Amazon Web Services. Online at http://aws.amazon.com.
-
-
-
-
4
-
-
77957936026
-
-
Online at
-
Google App Engine. Online at http://code.google.com/.
-
Google App Engine
-
-
-
7
-
-
85180620773
-
-
MySQL. Online at
-
MySQL. Online at http://www.mysql.com/.
-
-
-
-
8
-
-
85180635483
-
-
Opendb.com Web Database Hosting. Online at
-
Opendb.com Web Database Hosting. Online at http://www.opendb.com.
-
-
-
-
9
-
-
78649625398
-
-
Online at
-
Sun Utility Computing. Online at http://www.sun.com/service/sungrid/index.jsp.
-
Sun Utility Computing
-
-
-
10
-
-
85180541500
-
-
Online at
-
Yahoo Briefcase. Online at http://briefcase.yahoo.com.
-
Yahoo Briefcase
-
-
-
12
-
-
12444316237
-
-
1819 L Street, NW, Washington, DC 20036, USA. ANSI X3.135-1992 Database Language SQL
-
American National Standard for Information Systems, 1819 L Street, NW, Washington, DC 20036, USA. ANSI X3.135-1992 – Database Language SQL, 1992.
-
(1992)
American National Standard for Information Systems
-
-
-
15
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422–426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B. H.1
-
16
-
-
35048901123
-
Public key encryption with keyword search
-
LNCS 3027
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proceedings of Eurocrypt 2004, pages 506–522. LNCS 3027, 2004.
-
(2004)
Proceedings of Eurocrypt 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
17
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.
-
(2003)
EuroCrypt
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
19
-
-
4444361800
-
The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX
-
Boston, MA, June
-
G. Cattaneo, L. Catuogno, A. Del Sorbo, and P. Persiano. The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX. In Proceedings of the Annual USENIX Technical Conference, FREENIX Track, pages 245–252, Boston, MA, June 2001.
-
(2001)
Proceedings of the Annual USENIX Technical Conference, FREENIX Track
, pp. 245-252
-
-
Cattaneo, G.1
Catuogno, L.2
Del Sorbo, A.3
Persiano, P.4
-
20
-
-
34748812366
-
Privacy preserving keyword searches on remote encrypted data
-
Cryptology ePrint Archive, Report 2004/051
-
Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, 2004. http://eprint.iacr.org/.
-
(2004)
-
-
Chang, Y.1
Mitzenmacher, M.2
-
23
-
-
0035748036
-
Flexible authentication of XML documents
-
Premkumar T. Devanbu, Michael Gertz, April Kwong, Chip Martel, G. Nuckolls, and Stuart G. Stubblebine. Flexible authentication of XML documents. In ACM Conference on Computer and Communications Security, pages 136–145, 2001.
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 136-145
-
-
Devanbu, Premkumar T.1
Gertz, Michael2
Kwong, April3
Martel, Chip4
Nuckolls, G.5
Stubblebine, Stuart G.6
-
24
-
-
77958484856
-
Authentic third-party data publication
-
Premkumar T. Devanbu, Michael Gertz, Chip Martel, and Stuart G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security, pages 101–112, 2000.
-
(2000)
IFIP Workshop on Database Security
, pp. 101-112
-
-
Devanbu, Premkumar T.1
Gertz, Michael2
Martel, Chip3
Stubblebine, Stuart G.4
-
26
-
-
70349279685
-
-
Gartner, Inc. Technical report, Gartner Group/Dataquest
-
Gartner, Inc. Server Storage and RAID Worldwide. Technical report, Gartner Group/Dataquest, 1999. www.gartner.com.
-
(1999)
Server Storage and RAID Worldwide
-
-
-
27
-
-
21644437974
-
The Google File System
-
Bolton Landing, NY, October ACM SIGOPS
-
S. Ghemawat, H. Gobioff, and S. T. Leung. The Google File System. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03), pages 29–43, Bolton Landing, NY, October 2003. ACM SIGOPS.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03)
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S. T.3
-
28
-
-
33244488406
-
Secure indexes
-
Cryptology ePrint Archive, Report 2003/216
-
E. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
-
(2003)
-
-
Goh, E.1
-
30
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Springer-Verlag; Lecture Notes in Computer Science 3089
-
P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Proceedings of ACNS, pages 31–45. Springer-Verlag; Lecture Notes in Computer Science 3089, 2004.
-
(2004)
Proceedings of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
33
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM Press
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 216–227. ACM Press, 2002.
-
(2002)
Proceedings of the ACM SIGMOD international conference on Management of data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
40
-
-
33244477298
-
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
-
Atlanta, GA, November USENIX Association
-
A. Kashyap, S. Patil, G. Sivathanu, and E. Zadok. I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004), pages 69–79, Atlanta, GA, November 2004. USENIX Association.
-
(2004)
Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004)
, pp. 69-79
-
-
Kashyap, A.1
Patil, S.2
Sivathanu, G.3
Zadok, E.4
-
44
-
-
85180626968
-
-
Online at
-
Jan Kneschke, Lenz Grimmer, Martin Brown, Giuseppe Maxia, and Kay Röpke. Mysql proxy - mysql forge wiki. Online at http://forge.mysql.com/wiki/MySQL_Proxy, 2008.
-
(2008)
Mysql proxy - mysql forge wiki
-
-
Kneschke, Jan1
Grimmer, Lenz2
Brown, Martin3
Maxia, Giuseppe4
Röpke, Kay5
-
46
-
-
0141684090
-
Using Write Protected Data Structures to Improve Software Fault Tolerance in Highly Available Database Management Systems
-
M. Sullivan and M. Stonebraker. Using Write Protected Data Structures to Improve Software Fault Tolerance in Highly Available Database Management Systems. In Proceedings of VLDB, 1991.
-
(1991)
Proceedings of VLDB
-
-
Sullivan, M.1
Stonebraker, M.2
-
48
-
-
34548160016
-
Authentication of Outsourced Databases using Signature Aggregation and Chaining
-
Maithili Narasimha and Gene Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.
-
(2006)
Proceedings of DASFAA
-
-
Narasimha, Maithili1
Tsudik, Gene2
-
49
-
-
35248820993
-
-
Technical report
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authenticated data structures. Technical report, 2001.
-
(2001)
A general model for authenticated data structures
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
50
-
-
21044438930
-
A general model for authenticated data structures
-
Charles Martel, Glen Nuckolls, Premkumar Devanbu, Michael Gertz, April Kwong, and Stuart G. Stubblebine. A general model for authenticated data structures. Algorithmica, 39(1):21–41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, Charles1
Nuckolls, Glen2
Devanbu, Premkumar3
Gertz, Michael4
Kwong, April5
Stubblebine, Stuart G.6
-
51
-
-
0036953818
-
Building secure file systems out of byzantine storage
-
New York, NY, USA, ACM Press
-
David Mazières and Dennis Shasha. Building secure file systems out of byzantine storage. In PODC’02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, pages 108–117, New York, NY, USA, 2002. ACM Press.
-
(2002)
PODC’02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing
, pp. 108-117
-
-
Mazières, David1
Shasha, Dennis2
-
52
-
-
34748840535
-
StegFS: A Steganographic File System for Linux
-
A. D. McDonald and M. G. Kuhn. StegFS: A Steganographic File System for Linux. In Information Hiding, pages 462–477, 1999.
-
(1999)
Information Hiding
, pp. 462-477
-
-
McDonald, A. D.1
Kuhn, M. G.2
-
54
-
-
4244084593
-
-
Microsoft Research. Technical report, Microsoft Corporation, July
-
Microsoft Research. Encrypting File System for Windows 2000. Technical report, Microsoft Corporation, July 1999. www.microsoft.com/windows2000/techinfo/howitworks/ security/encrypt.asp.
-
(1999)
Encrypting File System for Windows 2000
-
-
-
57
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Springer
-
E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In Computer Security - ESORICS 2004, volume 3193 of Lecture Notes in Computer Science, pages 160–176. Springer, 2004.
-
(2004)
Computer Security - ESORICS 2004, volume 3193 of Lecture Notes in Computer Science
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
58
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
-
(1999)
Proceedings of EuroCrypt
-
-
Paillier, P.1
-
60
-
-
2442590644
-
Authenticating query results in edge computing
-
page Washington, DC, USA, IEEE Computer Society
-
HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge computing. In ICDE’04: Proceedings of the 20th International Conference on Data Engineering, page 560, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
ICDE’04: Proceedings of the 20th International Conference on Data Engineering
, pp. 560
-
-
Pang, HweeHwa1
Tan, Kian-Lee2
-
65
-
-
33244473885
-
-
Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May
-
G. Sivathanu, C. P. Wright, and E. Zadok. Enhancing File System Integrity Through Check-sums. Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May 2004. www.fsl.cs.sunysb.edu/docs/nc-checksum-tr/nc-checksum.pdf.
-
(2004)
Enhancing File System Integrity Through Check-sums
-
-
Sivathanu, G.1
Wright, C. P.2
Zadok, E.3
-
69
-
-
27144515662
-
NCryptfs: A Secure and Convenient Cryptographic File System
-
San Antonio, TX, June USENIX Association
-
C. P. Wright, M. Martino, and E. Zadok. NCryptfs: A Secure and Convenient Cryptographic File System. In Proceedings of the Annual USENIX Technical Conference, pages 197–210, San Antonio, TX, June 2003. USENIX Association.
-
(2003)
Proceedings of the Annual USENIX Technical Conference
, pp. 197-210
-
-
Wright, C. P.1
Martino, M.2
Zadok, E.3
|