Efficient and Private Access to Outsourced Data
暂无分享,去创建一个
Gerardo Pelosi | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | Gerardo Pelosi | S. Paraboschi | S. Foresti
[1] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[2] C. D. Kemp,et al. Density Estimation for Statistics and Data Analysis , 1987 .
[3] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[4] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[5] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[6] K. Selçuk Candan,et al. Hiding Traversal of Tree Structured Data from Untrusted Data Stores , 2003, ISI.
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Sabrina De Capitani di Vimercati,et al. Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.
[9] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[10] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[11] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[12] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[13] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.