Providing Database as a Service (2002)

Cached

Download Links

by Hakan Hacigumus , Bala Iyer , Sharad Mehrotra
Venue:In Proc. of ICDE
Citations:151 - 3 self

Documents Related by Co-Citation

203 Executing SQL over Encrypted Data in the Database-Service-Provider Model – Hakan Hacigumus, Hakan Hacg Um Us, Bala Iyer, Chen Li, Sharad Mehrotra - 2002
96 Authentication and Integrity in Outsourced Databases – Einar Mykletun, Maithili Narasimha, Gene Tsudik - 2004
79 Authentic Third-party Data Publication – Premkumar T. Devanbu, Michael Gertz, Chip Martel, Stuart G. Stubblebine - 2000
35 Modeling and assessing inference exposure in encrypted databases РAlberto Ceselli, Ernesto Damiani, Sabrina De, Capitani Di Vimercati, Università Di Milano, Stefano Paraboschi, Università Di Bergamo, Ernesto Damiani, Sabrina De, Capitani Vimercati - 2005
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
219 Practical Techniques for Searches on Encrypted Data – Dawn Xiaodong Song, David Wagner, Song David, Adrian Perrig - 2000
91 Controlling access to published data using cryptography – G Miklau, D Suciu - 2003
237 Aggregate and Verifiably Encrypted Signatures from Bilinear Maps – Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham - 2002
39 Authenticating Query Results in Edge Computing – Hweehwa Pang, Kian-lee Tan - 2004
78 A Privacy-Preserving Index for Range Queries – Bijit Hore, Sharad Mehrotra, Gene Tsudik - 2004
49 Efficient Execution of Aggregation Queries over Encrypted Relational Databases – H Hacigumus, B Iyer, S Mehrotra
10988 Computers and Intractability: A Guide to the Theory of NP-completeness – M Garey, D Johnson - 1979
325 A certified digital signature – Ralph C Merkle - 1989
285 Protocols for public key cryptosystems – R Merkle - 1980
46 Query Execution Assurance for Outsourced Databases – Radu Sion - 2005
50 A General Model for Authenticated Data Structures – Chip Martel, Glen Nuckolls, Prem Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine - 2001
84 Vertical Partitioning Algorithms for Database Design – Shamkant Navathe, Stefano Ceri, Gio Wiederhold, Jinglie Dou - 1984
12 Maximizing Sharing of Protected Information – Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati - 2002
32 L.V.S.: Efficient secure query evaluation over encrypted XML databases – Hui (wendy Wang - 2006