Preserving confidentiality of security policies in data outsourcing
暂无分享,去创建一个
Sushil Jajodia | Gerardo Pelosi | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti
[1] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[2] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[3] Alexander Borgida,et al. Efficient management of transitive relationships in large data and knowledge bases , 1989, SIGMOD '89.
[4] H. V. Jagadish,et al. A compression technique to materialize transitive closure , 1990, TODS.
[5] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[6] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[7] Ting Yu,et al. An identifiability-based access control model for privacy protection in open systems , 2004, WPES '04.
[8] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[9] Sushil Jajodia,et al. Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.
[10] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[11] Marianne Winslett,et al. The Traust Authorization Service , 2008, TSEC.
[12] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[13] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[14] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[15] Marianne Winslett,et al. PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.
[16] Ninghui Li,et al. Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.
[17] H. V. Jagadish,et al. Direct transitive closure algorithms: design and performance evaluation , 1990, TODS.
[18] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[19] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.
[20] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[21] Sushil Jajodia,et al. A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.
[22] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[23] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[24] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[25] Marianne Winslett,et al. Using Digital Credentials on the World Wide Web , 1997, J. Comput. Secur..
[26] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[27] Marianne Winslett,et al. Interoperable strategies in automated trust negotiation , 2001, CCS '01.
[28] Sushil Jajodia,et al. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing , 2007, SEC.
[29] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.