Providing Database as a Service (2002)

Cached

Download Links

by Hakan Hacigumus , Bala Iyer , Sharad Mehrotra
Venue:In Proc. of ICDE
Citations:151 - 3 self

Active Bibliography

1 Database Encryption- How to Balance Security with Performance – Ulf T. Mattsson, Protegrity Corp
203 Executing SQL over Encrypted Data in the Database-Service-Provider Model – Hakan Hacigumus, Hakan Hacg Um Us, Bala Iyer, Chen Li, Sharad Mehrotra - 2002
MASAUM Journal of Basic and Applied Sciences Vol.1, No. 2 September 2009 302 Mixed Encryption over Semi-Trusted Database – Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
2 An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies – Debasis Giri, Parmeshwary Dayal Srivastava - 2007
A Security Algorithm for On-Line Analytical Processing Data Cube 1 – Narander Kumar, Lucknow (u. P. India, Vishal Verma, Vipin Saxena
13 Privacy-Preserving Queries on Encrypted Data ⋆ – Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
2 Properties of Secure Transaction Protocols – Douglas Steves - 1997
8 A Protocol for Secure Transactions – Douglas H. Steves, Chris Edmondson-Yurkanan, Mohamed Gouda - 1996
190 Hippocratic databases – Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu - 2002
Copyright C – Ieee See, Michael B. Greenwald, Sandeep K. Singhal, Jonathan R. Stone, David R. Cheriton - 1996
8 A framework for efficient storage security in rdbms – Bala Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu - 2004
16 Architectures and Formal Representations for Secure Systems – Peter G. Neumann - 1995
1 Search key substitution in the encipherment of b-trees – Thomas Hardjono, Jennifer Seberry
2 A structure preserving database encryption scheme – Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes - 2004
A File Protection System Based on a Trapdoor One-way Hash Function – Chin-chen Chang, Chu-hsing Lin, Jung-san Lee
13 Adaptive Explicitly Parallel Instruction Computing – Surendranath Talla - 2000
45 A Security Architecture for Survivability Mechanisms – Chenxi Wang - 2000
Building a Security Service Center for Local Area Networks and Possible Applications in Practice – Pham Huy Dien
Design, Analysis, and FPGA prototyping of High-Performance Arithmetic for Cryptographic Applications Literature Review- Part 1: Cryptographic Algorithms – Mostafa Abd-el-barr, Alaaeldin Amin, Turki F. Al-somani