Efficient and secure distribution of massive geo-spatial data
暂无分享,去创建一个
[1] Jason Crampton,et al. On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[2] Alfredo De Santis,et al. Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..
[3] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[4] Wen-Guey Tzeng,et al. A secure system for data access based on anonymous authentication and time-dependent hierarchical keys , 2006, ASIACCS '06.
[5] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[6] Bernard Chazelle,et al. Computing partial sums in multidimensional arrays , 1989, SCG '89.
[7] Jyh-haw Yeh,et al. An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription , 2005, CIKM '05.
[8] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Robert E. Tarjan,et al. Fast Algorithms for Finding Nearest Common Ancestors , 1984, SIAM J. Comput..
[10] Chi-Sung Laih,et al. Merging: an efficient solution for a time-bound hierarchical key assignment scheme , 2006, IEEE Transactions on Dependable and Secure Computing.
[11] Ernesto Damiani,et al. Supporting location-based conditions in access control policies , 2006, ASIACCS '06.
[12] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[13] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[14] Mikhail J. Atallah,et al. Efficient techniques for realizing geo-spatial access control , 2007, ASIACCS '07.
[15] Ling Liu,et al. Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.
[16] Michael T. Goodrich,et al. Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.
[17] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[18] Mikhail J. Atallah,et al. Key management for non-tree access hierarchies , 2006, SACMAT '06.
[19] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[20] Hung-Yu Chien,et al. Efficient time-bound hierarchical key assignment scheme , 2004, IEEE Transactions on Knowledge and Data Engineering.
[21] Mikhail J. Atallah,et al. Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[22] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[23] Hung-Yu Chien,et al. New hierarchical assignment without Public Key cryptography , 2003, Comput. Secur..
[24] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[25] Chin-Chen Chang,et al. Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..
[26] Kian-Lee Tan,et al. Authenticating Multi-dimensional Query Results in Data Publishing , 2006, DBSec.
[27] Xun Yi,et al. Security of Chien's efficient time-bound hierarchical key assignment scheme , 2005, IEEE Transactions on Knowledge and Data Engineering.
[28] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[29] Mikhail J. Atallah,et al. Incorporating Temporal Capabilities in Existing Key Management Schemes , 2007, ESORICS.
[30] Andrew Chi-Chih Yao,et al. Space-time tradeoff for answering range queries (Extended Abstract) , 1982, STOC '82.
[31] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[32] Alfredo De Santis,et al. Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..
[33] Qiang Tang,et al. Comments on a cryptographic key assignment scheme , 2005, Comput. Stand. Interfaces.
[34] Stuart Haber,et al. Privacy-Preserving Verification of Aggregate Queries on Outsourced Databases , 2006 .
[35] Kian-Lee Tan,et al. Authenticating kNN Query Results in Data Publishing , 2007, Secure Data Management.
[36] Hong Chen,et al. Access Control Friendly Query Verification for Outsourced Data Publishing , 2008, ESORICS.
[37] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2008, Theor. Comput. Sci..
[38] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[39] Chin-Chen Chang,et al. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy , 2004, Comput. Stand. Interfaces.
[40] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[41] Sheng Zhong,et al. A practical key management scheme for access control in a user hierarchy , 2002, Comput. Secur..
[42] Chu-Hsing Lin,et al. Hierarchical key assignment without public-key cryptography , 2001, Comput. Secur..
[43] Yu-Fang Chung,et al. A novel key management scheme for dynamic access control in a user hierarchy , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[44] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[45] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[46] Mudhakar Srivatsa,et al. A Scalable Method for Access Control in Location-Based Broadcast Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[47] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[48] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[49] Richard R. Muntz,et al. Challenges in Location-Aware Computing , 2003, IEEE Pervasive Comput..