Optimizing Integrity Checks for Join Queries in the Cloud
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti
[1] Xiaofeng Meng,et al. Providing freshness guarantees for outsourced databases , 2008, EDBT '08.
[2] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[3] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[4] Sushil Jajodia,et al. Enforcing Subscription-Based Authorization Policies in Cloud Scenarios , 2012, DBSec.
[5] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[6] Feifei Li,et al. Authenticated Index Structures for Aggregation Queries , 2010, TSEC.
[7] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[8] Vincenzo Piuri,et al. Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.
[9] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[10] Tim Kraska,et al. An evaluation of alternative architectures for transaction processing in the cloud , 2010, SIGMOD Conference.
[11] Sushil Jajodia,et al. Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.
[12] John R. Vacca. Computer and Information Security Handbook , 2009 .
[13] Jaideep Vaidya,et al. Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[14] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[15] Vincenzo Piuri,et al. Chapter 1 – Fault Tolerance and Resilience in Cloud Computing Environments , 2014 .
[16] Jianliang Xu,et al. Authentication of range query results in mapreduce environments , 2011, CloudDB '11.
[17] Nora Cuppens-Boulahia,et al. Data and Applications Security and Privacy XXVI , 2012, Lecture Notes in Computer Science.
[18] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[19] Philip S. Yu,et al. Dual encryption for query integrity assurance , 2008, CIKM '08.
[20] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[21] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.