Security with privacy - A research agenda
暂无分享,去创建一个
[1] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[2] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[3] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[4] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[5] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[6] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[7] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[8] D. Richard Kuhn,et al. Attribute-Based Access Control , 2017, Computer.
[9] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[10] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[11] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[12] Youngseok Lee,et al. Toward scalable internet traffic measurement and analysis with Hadoop , 2013, CCRV.
[13] Ian F. Blake,et al. One-round secure comparison of integers , 2009, J. Math. Cryptol..
[14] Sanjay Kumar Madria,et al. A secure data sharing and query processing framework via federation of cloud computing , 2015, Inf. Syst..
[15] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[16] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[17] Iman Saleh,et al. Social-Network-Sourced Big Data Analytics , 2013, IEEE Internet Computing.
[18] Elisa Bertino,et al. Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data , 2014, ESORICS.
[19] Xindong Wu,et al. Data mining with big data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[20] Laks V. S. Lakshmanan,et al. Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases , 2013, IEEE Systems Journal.
[21] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[22] Elisa Bertino. Security with Privacy -- Opportunities and Challenges: Panel Position Paper , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[23] Philip S. Yu,et al. k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining , 2010, KDD.
[24] Elaine Shi,et al. GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.
[25] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[26] Elisa Bertino. Security with Privacy-Opportunities and Challenges , 2016 .
[27] Hakan Hacigümüs,et al. Query Optimization in Encrypted Database Systems , 2005, DASFAA.
[28] Jianliang Xu,et al. Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[29] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.
[30] Ninghui Li,et al. OACerts: Oblivious Attribute Certificates , 2005, IEEE Transactions on Dependable and Secure Computing.
[31] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[32] Wenchao Huang,et al. Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[33] Xun Yi,et al. Practical Internet voting system , 2013, J. Netw. Comput. Appl..
[34] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[35] Elisa Bertino,et al. Data Protection from Insider Threats , 2012, Data Protection from Insider Threats.
[36] Elisa Bertino,et al. Privacy-Preserving Association Rule Mining in Cloud Computing , 2015, AsiaCCS.
[37] Elisa Bertino,et al. DBMask: Fine-Grained Access Control on Encrypted Relational Databases , 2015, Trans. Data Priv..
[38] Wei Jiang,et al. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[39] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[40] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[41] K. Srinathan,et al. Efficient Privacy Preserving K-Means Clustering , 2010, PAISI.
[42] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[43] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[44] Amit Sahai,et al. Computing on Encrypted Data , 2008, ICISS.
[45] Jimeng Sun,et al. Big data analytics for healthcare , 2013, KDD.
[46] Wei Jiang,et al. Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[47] Dongxi Liu,et al. Privacy of outsourced k-means clustering , 2014, AsiaCCS.
[48] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.
[49] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[50] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[51] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[52] Elisa Bertino,et al. Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.
[53] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[54] Nikos Mamoulis,et al. Security in Outsourcing of Association Rule Mining , 2007, VLDB.
[55] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[56] Wei Jiang,et al. An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.
[57] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[58] Gerardo Pelosi,et al. Efficient and Private Access to Outsourced Data , 2011, 2011 31st International Conference on Distributed Computing Systems.
[59] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[60] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[61] John Gantz,et al. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .
[62] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[63] Julie Miller,et al. Big data, big deal , 2012, July/Aug 2011.
[64] Ling Liu,et al. k nearest neighbor classification across multiple private databases , 2006, CIKM '06.
[65] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[66] Chris Clifton,et al. Privately Computing a Distributed k-nn Classifier , 2004, PKDD.
[67] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[68] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[69] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[70] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[71] Radu Sion,et al. Towards Secure Data Outsourcing , 2008, Handbook of Database Security.
[72] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[73] Daniela Fischer,et al. Digital Design And Computer Architecture , 2016 .
[74] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[75] E. Kushilevitz. Foundations of Cryptography Foundations of Cryptography , 2014 .
[76] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[77] Ninghui Li,et al. On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[78] Elisa Bertino,et al. Poster: towards attribute based group key management , 2011, CCS '11.
[79] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[80] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[81] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[82] Sachin S. Sapatnekar,et al. Designing Digital Computer Systems with Verilog , 2004 .