Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Valentina Ciriani | Sara Foresti
[1] Eugene Wong,et al. Query processing in a system for distributed databases (SDD-1) , 1981, TODS.
[2] Shamkant B. Navathe,et al. Vertical partitioning for database design: a graphical algorithm , 1989, SIGMOD '89.
[3] David S. Johnson,et al. Approximation algorithms for combinatorial problems , 1973, STOC.
[4] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[5] Stefano Paraboschi,et al. Database Systems: Concepts, Languages & Architectures , 1999 .
[6] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Stefano Ceri,et al. Distributed Databases: Principles and Systems , 1984 .
[9] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Sushil Jajodia,et al. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[11] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[12] Joachim Biskup,et al. Reducing inference control to access control for normalized database schemas , 2008, Inf. Process. Lett..
[13] Sabrina De Capitani di Vimercati,et al. Maximizing Sharing of Protected Information , 2002, J. Comput. Syst. Sci..
[14] Donald Kossmann,et al. The state of the art in distributed query processing , 2000, CSUR.
[15] Stefano Paraboschi,et al. Database Systems - Concepts, Languages and Architectures , 1999 .
[16] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[17] Giorgio Ausiello,et al. Structure Preserving Reductions among Convex Optimization Problems , 1980, J. Comput. Syst. Sci..
[18] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[19] Sushil Jajodia,et al. Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.
[20] Sushil Jajodia,et al. Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.