A Structure Preserving Database Encryption Scheme
暂无分享,去创建一个
Ehud Gudes | Yuval Elovici | Erez Shmueli | Ronen Vaisenberg | Y. Elovici | E. Shmueli | Ronen Vaisenberg | E. Gudes
[1] Stéphane Bressan,et al. Introduction to Database Systems , 2005 .
[2] I. M. Yaglom,et al. Geometric Transformations I , 1962 .
[3] Jan Chomicki,et al. Hippo: A System for Computing Consistent Answers to a Class of SQL Queries , 2004, EDBT.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Peter Bodorik,et al. Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.
[6] Ralph Howard,et al. Data encryption standard , 1987 .
[7] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[8] R. Bayer,et al. On the encipherment of search trees and random access files , 1975, SIGF.
[9] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[10] Elisa Bertino,et al. Secure and selective dissemination of XML documents , 2002, TSEC.
[11] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[12] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[13] Christopher J. Merz,et al. UCI Repository of Machine Learning Databases , 1996 .
[14] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[15] Gene Tsudik,et al. A Framework for Efficient Storage Security in RDBMS , 2004, EDBT.
[16] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[17] Wei-Pang Yang,et al. Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..
[18] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[19] Bhavani M. Thuraisingham,et al. Design of LDV: a multilevel secure relational database management system , 1990 .
[20] Rathindra Sarathy,et al. A General Additive Data Perturbation Method for Database Security , 1999 .
[21] Wei-Pang Yang,et al. A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..
[22] Asuman Dogac,et al. A Semantic based Privacy Framework for Web Services , 2003 .
[23] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[24] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[25] D. K. Branstad,et al. Data Encryption Standard: past and future , 1988, Proc. IEEE.
[26] Luc Bouganim,et al. Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.
[27] Wei-Pang Yang,et al. A New Dynamic Access Control Scheme Based on Subject-Object List , 1994, Data Knowl. Eng..
[28] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[29] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[30] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[31] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[32] H. J. Pels,et al. An introduction to database systems, sixth edition , 1997 .
[33] Lance J. Hoffman,et al. Building Privacy into the Semantic Web: An Ontology Needed Now , 2002 .
[34] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[35] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[36] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.