Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
暂无分享,去创建一个
[1] Jaehong Park,et al. Usage Control: A Vision for Next Generation Access Control , 2003, MMM-ACNS.
[2] Chris Clifton,et al. Security Issues in Querying Encrypted Data , 2005, DBSec.
[3] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[4] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[5] Luc Bouganim,et al. Chip-Secured Data Access: Reconciling Access Rights with Data Encryption , 2003, VLDB.
[6] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Luc Bouganim,et al. Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.