Enhancing Secured Service Interoperability with Decentralized Orchestration
暂无分享,去创建一个
[1] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[2] Sushil Jajodia,et al. Secure mediated databases , 1996, Proceedings of the Twelfth International Conference on Data Engineering.
[3] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[4] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[5] Yi-Ting Chiang,et al. Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.
[6] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[7] Kincho H. Law,et al. CHAOS: An Active Security Mediation System , 2000, CAiSE.
[8] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[9] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.
[10] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[11] Sheng Zhong,et al. Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Joachim Biskup,et al. Explicit Representation of Constrained Schema Mappings for Mediated Data Integration , 2002, DNIS.
[14] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[15] Elisa Bertino,et al. Securing XML data in third-party distribution systems , 2005, CIKM '05.
[16] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[17] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[18] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[19] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[20] Michael R. Genesereth,et al. The Conceptual Basis for Mediation Services , 1997, IEEE Expert.
[21] Joachim Biskup,et al. Secure Mediation with Mobile Code , 2005, DBSec.
[22] Joachim Biskup,et al. Secure Mediation: Requirements, Design, and Architecture , 2003, J. Comput. Secur..
[23] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[24] Doerte K. Rappe. Homomorphic cryptosystems and their applications , 2005, IACR Cryptol. ePrint Arch..