Distributed Query Evaluation over Encrypted Data
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | Giovanni Livraga
[1] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[2] Sushil Jajodia,et al. Authorization enforcement in distributed query evaluation , 2011, J. Comput. Secur..
[3] Heri Ramampiaro,et al. End-to-End Machine Learning with Apache AsterixDB , 2018, DEEM@SIGMOD.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Murat Kantarcioglu,et al. Secure and Efficient Query Processing over Hybrid Clouds , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[6] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[7] Ken Barker,et al. Privacy-preservation in the integration and querying of multidimensional data models , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[8] Michael Benedikt,et al. Querying with Access Patterns and Integrity Constraints , 2015, Proc. VLDB Endow..
[9] Sushil Jajodia,et al. Fragmentation in Presence of Data Dependencies , 2014, IEEE Transactions on Dependable and Secure Computing.
[10] Jennie Duggan,et al. SMCQL: Secure Query Processing for Private Data Networks , 2016, Proc. VLDB Endow..
[11] Joseph K. Bradley,et al. Spark SQL: Relational Data Processing in Spark , 2015, SIGMOD Conference.
[12] Jorge Lobo,et al. Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation , 2015, IEEE Transactions on Knowledge and Data Engineering.
[13] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[14] Ulf Leser,et al. Optimization of Complex Dataflows with User-Defined Functions , 2017, ACM Comput. Surv..
[15] Shantanu Sharma,et al. Advances in Cryptography and Secure Hardware for Data Outsourcing , 2020, 2020 IEEE 36th International Conference on Data Engineering (ICDE).
[16] Marco Guarnieri,et al. Optimal Security-Aware Query Processing , 2014, Proc. VLDB Endow..
[17] Divesh Srivastava,et al. Data model and query evaluation in global information systems , 1995, Journal of Intelligent Information Systems.
[18] Mira Mezini,et al. Language-integrated privacy-aware distributed queries , 2019, Proc. ACM Program. Lang..
[19] Panos K. Chrysanthis,et al. Authorization-aware optimization for multi-provider queries , 2019, SAC.
[20] Lakshminarayanan Subramanian,et al. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases , 2009, NDSS.
[21] Donald Kossmann,et al. The state of the art in distributed query processing , 2000, CSUR.
[22] Ting Yu,et al. PAQO: Preference-aware query optimization for decentralized database systems , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[23] M. Benedikt,et al. When Can We Answer Queries Using Result-Bounded Data Interfaces? , 2017, PODS.
[24] Murat Kantarcioglu,et al. Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[25] Sushil Jajodia,et al. An Authorization Model for Multi-Provider Queries , 2017, Proc. VLDB Endow..