A Practical Framework for Privacy-Preserving NoSQL Databases
暂无分享,去创建一个
João Paulo | Ricardo Macedo | Miguel Matos | Rui Oliveira | Bernardo Portela | Rogerio Pontes | Tiago Oliveira | R. Oliveira | M. Matos | Ricardo Macedo | J. Paulo | Bernardo Portela | Rogério Pontes | Tiago Oliveira
[1] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[2] Manuel Barbosa,et al. Performance trade-offs on a secure multi-party relational database , 2017, SAC.
[3] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Cong Wang,et al. Building an Encrypted, Distributed, and Searchable Key-value Store , 2016, AsiaCCS.
[6] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[7] Tao Xiang,et al. Processing secure, verifiable and efficient SQL over outsourced database , 2016, Inf. Sci..
[8] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[9] João Paulo,et al. SafeRegions: Performance Evaluation of Multi-party Protocols on HBase , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW).
[10] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[11] 이상훈,et al. 트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템 , 2014 .
[12] Dan Bogdanov,et al. High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.
[13] Vincent Lefèvre,et al. MPFR: A multiple-precision binary floating-point library with correct rounding , 2007, TOMS.
[14] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[15] Rishabh Poddar,et al. Arx: A Strongly Encrypted Database System , 2016, IACR Cryptol. ePrint Arch..
[16] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[17] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[18] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[19] Murat Kantarcioglu,et al. BigSecret: A Secure Data Management Framework for Key-Value Stores , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[20] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[21] Prashant Malik,et al. Cassandra: a decentralized structured storage system , 2010, OPSR.
[22] Emin Gün Sirer,et al. HyperDex: a distributed, searchable key-value store , 2012, SIGCOMM '12.
[23] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[24] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[25] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .