Confidentiality-Preserving Query Execution of Fragmented Outsourced Data
暂无分享,去创建一个
Takeo Kanade | Erich J. Neuhold | Moni Naor | Gerhard Weikum | Madhu Sudan | John C. Mitchell | Friedemann Mattern | David Hutchison | Moshe Y. Vardi | Edgar Weippl | Khabib Mustofa | Demetri Terzopoulos | Doug Tygar | Bernhard Steffen | Min Tjoa | C. | Pandu Rangan | Josef | Kittler
[1] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[2] Adam O'Neill,et al. Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles , 2008, CRYPTO.
[3] Sushil Jajodia,et al. Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.
[4] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[5] Joachim Biskup,et al. On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints , 2011, ISC.
[6] Shamkant B. Navathe,et al. Vertical partitioning algorithms for database design , 1984, TODS.
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Edgar R. Weippl,et al. Data Confidentiality using Fragmentation in Cloud Computing , 2013, Int. J. Pervasive Comput. Commun..
[9] Sushil Jajodia,et al. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[10] Sabrina De Capitani di Vimercati,et al. Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach , 2011, DBSec.