Sensitive Data Protection of DBaaS Using OPE and FPE
暂无分享,去创建一个
[1] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[2] Hiroyuki Kitagawa,et al. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..
[3] Satish Narayana Srirama,et al. A Statistical Approach for Identifying Memory Leaks in Cloud Applications , 2011, CLOSER.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Wei Wang,et al. Fast Query Over Encrypted Character Data in Database , 2004, CIS.
[6] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[7] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[8] Wei Wang,et al. Storage and Query over Encrypted Character and Numerical Data in Database , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[9] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[11] Dongdai Lin,et al. Security Analysis for an Order Preserving Encryption Scheme , 2010 .
[12] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[13] Dongxi Liu,et al. Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[14] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[15] Bruce Schneier,et al. Practical cryptography , 2003 .
[16] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[17] Hiroyuki Kitagawa,et al. A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases , 2010, KMIS.
[18] Stanley B. Zdonik,et al. Fast, Secure Encryption for Indexing in a Column-Oriented DBMS , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[20] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.
[21] I-Ling Yen,et al. A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[23] Dongxi Liu,et al. Nonlinear order preserving index for encrypted database query in service cloud environments , 2013, Concurr. Comput. Pract. Exp..
[24] I-Ling Yen,et al. Security analysis for order preserving encryption schemes , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[25] Sehun Kim,et al. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..
[26] I-Ling Yen,et al. Extending Order Preserving Encryption for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..
[27] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[28] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[29] Sung Je Hong,et al. Order-Preserving Encryption for Non-uniformly Distributed Plaintexts , 2011, WISA.