Balancing confidentiality and efficiency in untrusted relational DBMSs
暂无分享,去创建一个
Sushil Jajodia | Ernesto Damiani | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | P. Samarati | S. Vimercati | S. Jajodia | E. Damiani | S. Paraboschi
[1] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[2] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[3] Jiann-Liang Chen,et al. Security-enhanced packet video with dynamic multicast throughput adjustment , 2001, Int. J. Netw. Manag..
[4] Shmuel Tomi Klein,et al. Storing text retrieval systems on CD-ROM: compression and encryption considerations , 1989, SIGIR '89.
[5] Luc Bouganim,et al. Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] Jie Xu,et al. Private information retrieval in the presence of malicious failures , 2002, Proceedings 26th Annual International Computer Software and Applications.
[8] Julie Ward,et al. Appia: Automatic Storage Area Network Fabric Design , 2002, FAST.
[9] David J. DeWitt,et al. A multiuser performance analysis of alternative declustering strategies , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[10] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[12] Jinx P. Walton. Developing an enterprise information security policy , 2002, SIGUCCS '02.
[13] Stefano Ceri,et al. Horizontal data partitioning in database design , 1982, SIGMOD '82.
[14] Christian Damsgaard Jensen,et al. CryptoCache: a secure sharable file cache for roaming users , 2000, ACM SIGOPS European Workshop.
[15] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[16] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.