Executing SQL over encrypted data in the database-service-provider model
暂无分享,去创建一个
Hakan Hacigümüs | Chen Li | Sharad Mehrotra | Balakrishna R. Iyer | S. Mehrotra | B. Iyer | Hakan Hacigümüs | Chen Li | Hakan Hacıgümüş
[1] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[2] Abraham Silberschatz,et al. Database Systems Concepts , 1997 .
[3] Beng Chin Ooi,et al. Global optimization of histograms , 2001, SIGMOD '01.
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[6] Jennifer Widom,et al. Database Systems: The Complete Book , 2001 .
[7] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[8] Abraham Silberschatz,et al. Database System Concepts, 3rd Edition , 1991 .
[9] Marianne Winslett. Jeffrey D. Ullman Speaks Out on the Future of Higher Education, Startups, Database Theory, and More , 2001, SIGMOD Rec..
[10] Gregory Piatetsky-Shapiro,et al. Accurate estimation of the number of tuples satisfying a condition , 1984, SIGMOD '84.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Yannis E. Ioannidis,et al. Histogram-Based Approximation of Set-Valued Query-Answers , 1999, VLDB.