Access Control for the Shuffle Index
暂无分享,去创建一个
Gerardo Pelosi | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | Gerardo Pelosi | S. Paraboschi | S. Foresti
[1] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[2] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[3] V. Piuri,et al. Fault tolerance management in IaaS clouds , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[4] Sushil Jajodia,et al. Private data indexes for selective access to outsourced data , 2011, WPES '11.
[5] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[6] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[7] K. Selçuk Candan,et al. Hiding Traversal of Tree Structured Data from Untrusted Data Stores , 2003, ISI.
[8] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[10] Pierangela Samarati,et al. Cloud Security: Issues and Concerns , 2016 .
[11] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[12] Gerardo Pelosi,et al. Supporting concurrency and multiple indexes in private access to outsourced data , 2013, J. Comput. Secur..
[13] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[14] Gerardo Pelosi,et al. Three-Server Swapping for Access Confidentiality , 2018, IEEE Transactions on Cloud Computing.
[15] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[16] Vincenzo Piuri,et al. Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[17] Gerardo Pelosi,et al. Shuffle Index , 2015, ACM Trans. Storage.
[18] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.