A survey on querying encrypted XML documents for databases as a service
暂无分享,去创建一个
[1] Yin Yang,et al. An Efficient Approach to Support Querying Secure Outsourced XML Information , 2006, CAiSE.
[2] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[3] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.
[4] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[5] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[6] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[7] Wilfred Ng,et al. XQzip: Querying Compressed XML Using Structural Indexing , 2004, EDBT.
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Sharad Mehrotra,et al. Querying Encrypted XML Documents , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).
[10] Michael Schrefl,et al. SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[11] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[12] Alexander V. Veidenbaum,et al. Innovative Architecture for Future Generation High-Performance Processors and Systems , 2003, Innovative Architecture for Future Generation High-Performance Processors and Systems, 2003.
[13] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[14] Jae-Gil Lee,et al. Secure query processing against encrypted XML data using Query-Aware Decryption , 2006, Inf. Sci..
[15] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[16] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[17] C. M. Sperberg-McQueen,et al. Extensible markup language , 1997 .
[18] Ling Feng,et al. Efficient Processing of Secured XML Metadata , 2003, OTM Workshops.
[19] Wenfei Fan,et al. Vectorizing and querying large XML repositories , 2005, 21st International Conference on Data Engineering (ICDE'05).