L.V.S.: Efficient secure query evaluation over encrypted XML databases (2006)


Download Links

by Hui (wendy Wang
Venue:In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB’06), Seoul, Korea
Citations:32 - 1 self

Documents Related by Co-Citation

203 Executing SQL over Encrypted Data in the Database-Service-Provider Model – Hakan Hacigumus, Hakan Hacg Um Us, Bala Iyer, Chen Li, Sharad Mehrotra - 2002
35 Modeling and assessing inference exposure in encrypted databases – Alberto Ceselli, Ernesto Damiani, Sabrina De, Capitani Di Vimercati, Università Di Milano, Stefano Paraboschi, Università Di Bergamo, Ernesto Damiani, Sabrina De, Capitani Vimercati - 2005
151 Providing Database as a Service – Hakan Hacigumus, Bala Iyer, Sharad Mehrotra - 2002
73 Balancing Confidentiality and efficiency in untrusted relational DBMSs – E Damiani, S D C Vimercati, S Jajodia, S Paraboschi, P Samarati
116 Order Preserving Encryption for Numeric Data – Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu - 2004
91 Controlling access to published data using cryptography – G Miklau, D Suciu - 2003
15 Fragmentation and Encryption to Enforce Privacy in Data Storage – Valentina Ciriani, Sabrina De, Capitani Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
40 Two can keep a secret: A distributed architecture for secure database services – G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu - 2005
64 Dynamic and efficient key management for access hierarchies – Marina Blanton, Nelly Fazio, Keith B. Frikken - 2005
12 Maximizing Sharing of Protected Information – Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati - 2002
415 Private Information Retrieval – Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan - 1997
14 Capitani di Vimercati, “Data protection in outsourcing scenarios: issues and directions – P Samarati, S De
29 Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage – Peter Williams, Radu Sion, Bogdan Carbunar
14 F.: Robust fingerprint detection for access control – M Gamassi, V Piuri, D Sana, Scotti - 2005
19 Privacy-aware biometrics: Design and implementation of a multimodal verification system – S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti - 2008
24 Over-encryption: management of access control evolution on outsourced data – S D C di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
8 Reducing inference control to access control for normalized database schemas – J Biskup, D W Embley, J Lochner - 2008
64 Vertical Partitioning in Database Design: A Graphical Algorithm – S Navathe, M Ra - 1989
18 De Capitani di Vimercati – V Ciriani, S - 2007