Protecting Privacy in the Cloud : Current Practices
暂无分享,去创建一个
Bashar Nuseibeh | Arosha K. Bandara | Mahmoud Barhamgi | Khalid Belhajjame | Yijun Yu | B. Nuseibeh | Yijun Yu | A. Bandara | M. Barhamgi | Khalid Belhajjame
[1] Ting Yu,et al. PAQO: Preference-aware query optimization for decentralized database systems , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[2] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[3] Divyakant Agrawal,et al. Towards practical private processing of database queries over public data , 2014, Distributed and Parallel Databases.
[4] Khin Mi Mi Aung,et al. Homomorphic exclusive-or operation enhance secure searching on cloud storage , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[5] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.
[6] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[7] Jr. Harry Katzan. On The Privacy Of Cloud Computing , 2011, BIOINFORMATICS 2011.
[8] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[9] Stéphane Betgé-Brezetz,et al. End-to-end privacy policy enforcement in cloud infrastructure , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).
[10] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[11] Ken Eguro,et al. Transaction processing on confidential data using cipherbase , 2015, 2015 IEEE 31st International Conference on Data Engineering.