L.V.S.: Efficient secure query evaluation over encrypted XML databases (2006)


Download Links

by Hui (wendy Wang
Venue:In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB’06), Seoul, Korea
Citations:33 - 1 self

Documents Related by Co-Citation

203 Executing SQL over Encrypted Data in the Database-Service-Provider Model – Hakan Hacigumus, Hakan Hacg Um Us, Bala Iyer, Chen Li, Sharad Mehrotra - 2002
35 Modeling and assessing inference exposure in encrypted databases – Alberto Ceselli, Ernesto Damiani, Sabrina De, Capitani Di Vimercati, Università Di Milano, Stefano Paraboschi, Università Di Bergamo, Ernesto Damiani, Sabrina De, Capitani Vimercati - 2005
151 Providing Database as a Service – Hakan Hacigumus, Bala Iyer, Sharad Mehrotra - 2002
73 Balancing Confidentiality and efficiency in untrusted relational DBMSs – E Damiani, S D C Vimercati, S Jajodia, S Paraboschi, P Samarati
116 Order Preserving Encryption for Numeric Data – Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu - 2004
91 Controlling access to published data using cryptography – G Miklau, D Suciu - 2003
15 Fragmentation and Encryption to Enforce Privacy in Data Storage – Valentina Ciriani, Sabrina De, Capitani Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
40 Two can keep a secret: A distributed architecture for secure database services – G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu - 2005
64 Dynamic and efficient key management for access hierarchies – Marina Blanton, Nelly Fazio, Keith B. Frikken - 2005
12 Maximizing Sharing of Protected Information – Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati - 2002
8 Reducing inference control to access control for normalized database schemas – J Biskup, D W Embley, J Lochner - 2008
64 Vertical Partitioning in Database Design: A Graphical Algorithm – S Navathe, M Ra - 1989
18 De Capitani di Vimercati – V Ciriani, S - 2007
10870 Computers and Intractability: A Guide to the Theory of NP-Completeness – M R Garey, D S Johnson - 1979
10 P.: Fragmentation design for efficient query execution over sensitive distributed databases – Valentina Ciriani, Sabrina De, Capitani Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati - 2009
411 Private Information Retrieval – Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan - 1997
19 F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system – S Cimato, M Gamassi, V Piuri, R Sassi, Scotti - 2008
14 F.: Robust fingerprint detection for access control – M Gamassi, V Piuri, D Sana, Scotti - 2005
9 Candan, “Hiding Traversal of Tree Structured Data from Untrusted Data Stores – P Lin, K S - 2004