Integrity for join queries in the cloud
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | S. Jajodia | S. Paraboschi | S. Foresti
[1] Vincenzo Piuri,et al. Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[2] Sushil Jajodia,et al. Encryption-Based Policy Enforcement for Cloud Storage , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[3] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[4] Sushil Jajodia,et al. Enforcing Subscription-Based Authorization Policies in Cloud Scenarios , 2012, DBSec.
[5] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Tim Kraska,et al. An evaluation of alternative architectures for transaction processing in the cloud , 2010, SIGMOD Conference.
[7] Radu Sion,et al. Toward Private Joins on Outsourced Data , 2012, IEEE Transactions on Knowledge and Data Engineering.
[8] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[9] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[10] Cong Wang,et al. Proof-Carrying Cloud Computation: The Case of Convex Optimization , 2014, IEEE Transactions on Information Forensics and Security.
[11] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[12] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[13] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[14] Philip S. Yu,et al. Dual encryption for query integrity assurance , 2008, CIKM '08.
[15] Srinath T. V. Setty,et al. A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[16] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[17] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.
[18] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[19] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[20] Vijay Varadharajan,et al. TREASURE: Trust Enhanced Security for Cloud Environments , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[21] Sushil Jajodia,et al. Key management for multi-user encrypted databases , 2005, StorageSS '05.
[22] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[23] Alin Deutsch,et al. Load-balanced query dissemination in privacy-aware online communities , 2010, SIGMOD Conference.
[24] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[25] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[26] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[27] Kian-Lee Tan,et al. Verifying Completeness of Relational Query Answers from Online Servers , 2008, TSEC.
[28] Bhavani M. Thuraisingham,et al. Risk-Aware Workload Distribution in Hybrid Clouds , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[29] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.