Data Protection in Cloud Scenarios
暂无分享,去创建一个
Sabrina De Capitani di Vimercati | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | S. Foresti
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[3] Philip S. Yu,et al. Dual encryption for query integrity assurance , 2008, CIKM '08.
[4] Sushil Jajodia,et al. Authorization enforcement in distributed query evaluation , 2011, J. Comput. Secur..
[5] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[6] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[7] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[8] Ying Yin,et al. Verifying correctness of inner product of vectors in cloud computing , 2013, Cloud Computing '13.
[9] Sushil Jajodia,et al. Integrity for distributed queries , 2014, 2014 IEEE Conference on Communications and Network Security.
[10] Gerardo Pelosi,et al. Efficient and Private Access to Outsourced Data , 2011, 2011 31st International Conference on Distributed Computing Systems.
[11] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[12] Sabrina De Capitani di Vimercati,et al. Data Security Issues in Cloud Scenarios , 2015, ICISS.
[13] Sushil Jajodia,et al. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients , 2009, DBSec.
[14] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[15] Ting Yu,et al. PAQO: Preference-aware query optimization for decentralized database systems , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[16] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[17] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[18] Sushil Jajodia,et al. Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Sushil Jajodia,et al. Fragmentation in Presence of Data Dependencies , 2014, IEEE Transactions on Dependable and Secure Computing.
[21] Murat Kantarcioglu,et al. Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[22] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[23] Feifei Li,et al. Authenticated Index Structures for Aggregation Queries , 2010, TSEC.
[24] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[25] Pierangela Samarati,et al. Cloud Security: Issues and Concerns , 2016 .
[26] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[27] Vincenzo Piuri,et al. Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.
[28] Sushil Jajodia,et al. Keep a Few: Outsourcing Data While Maintaining Confidentiality , 2009, ESORICS.
[29] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[30] Sushil Jajodia,et al. Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.
[31] Gerardo Pelosi,et al. Shuffle Index , 2015, ACM Trans. Storage.
[32] V. Piuri,et al. Fault tolerance management in IaaS clouds , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[33] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[34] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[35] Jorge Lobo,et al. Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation , 2015, IEEE Transactions on Knowledge and Data Engineering.
[36] Vincenzo Piuri,et al. Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[37] Pierangela Samarati. Data Security and Privacy in the Cloud , 2014, ISPEC.
[38] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[39] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[40] Stephan Olariu,et al. Data Integrity Evaluation in Cloud Database-as-a-Service , 2013, 2013 IEEE Ninth World Congress on Services.
[41] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[42] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[43] Ashutosh Saxena,et al. Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach , 2013, ICISS.