Secure query processing against encrypted XML data using Query-Aware Decryption
暂无分享,去创建一个
[1] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[2] Ioana Manolescu,et al. XMark: A Benchmark for XML Data Management , 2002, VLDB.
[3] Steven J. DeRose,et al. XML Path Language (XPath) Version 1.0 , 1999 .
[4] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[5] Elisa Bertino,et al. Secure and selective dissemination of XML documents , 2002, TSEC.
[6] D. Eastlake,et al. XML Encryption Syntax and Processing , 2003 .
[7] Lois Mai Chan. Dewey Decimal Classification: A Practical Guide , 1994 .
[8] David M. Booth,et al. Web Services Architecture , 2004 .
[9] S. Boag,et al. XQuery 1.0 : An XML query language, W3C Working Draft 12 November 2003 , 2003 .
[10] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Christos Faloutsos,et al. Access methods for text , 1985, CSUR.
[12] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[13] Divesh Srivastava,et al. Holistic twig joins: optimal XML pattern matching , 2002, SIGMOD '02.
[14] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[15] David J. DeWitt,et al. On supporting containment queries in relational database management systems , 2001, SIGMOD '01.
[16] Andrew B. Whinston,et al. P2P Networking: An Information-Sharing Alternative , 2001, Computer.