Range query integrity in the cloud: the case of video surveillance
暂无分享,去创建一个
[1] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[2] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[3] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[4] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[5] Gunter Saake,et al. Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data , 2015, GvD.
[6] Haixun Wang,et al. A query integrity assurance scheme for accessing outsourced spatial databases , 2012, GeoInformatica.
[7] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[8] Francesco Buccafurri,et al. Enhancing histograms by tree-like bucket indices , 2007, The VLDB Journal.
[9] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[10] Pierangela Samarati. Data Security and Privacy in the Cloud , 2014, ISPEC.
[11] Antonino Nocera,et al. PHIS: A system for scouting potential hubs and for favoring their "growth" in a Social Internetworking Scenario , 2012, Knowl. Based Syst..
[12] Feifei Li,et al. Authenticated Index Structures for Aggregation Queries , 2010, TSEC.
[13] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[14] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[15] Sushil Jajodia,et al. Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.
[16] Francesco Buccafurri,et al. Accountability-Preserving Anonymous Delivery of Cloud Services , 2015, TrustBus.
[17] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[18] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[19] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[20] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[21] Francesco Buccafurri,et al. Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments , 2014, SEBD.
[22] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[23] Tao Wen,et al. Query integrity verification based-on MAC chain in cloud storage , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).
[24] Philip S. Yu,et al. Dual encryption for query integrity assurance , 2008, CIKM '08.
[25] Jianliang Xu,et al. Authentication of range query results in mapreduce environments , 2011, CloudDB '11.
[26] Francesco Buccafurri,et al. A Privacy-Preserving Solution for Tracking People in Critical Environments , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.