Databases Reference
In-Depth Information
4. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu Order Preserving Encryption for
Numeric Data In Proc.ofSIGMOD 2004.
5. R. Agrawal, D. Asonov, M. Kantarcioglu, Y. Li Sovereign Joins In ICDE 2006.
6. N. Ahituv, Y. Lapid, S. Neumann Processing Encrypted Data In Communica-
tions of the ACM , 1987 Vol. 30, 9, pp.777-780
7. L. Ballard, S. Kamara, F. Monrose Achieving Ecient conjunctive keyword
searches over encrypted data. In ICICS 2005.
8. D. Boneh, G. di Crescenzo, R. Ostrovsky, and G. Persiano Public Key Encryp-
tion with Keyword Search. In Advances in Cryptology - Eurocrypt 2004 (2004).
volume 3027 of Lecture Notes in Computer Science , pp. 506-522. Springer-
Verlag, 2004.
9. L. Bouganim, and P. Pucheral. Chip-Secured Data Access: Confidential Data
on Untrusted Servers In Proc. of VLDB 2002.
10. E. Brickell, Y. Yacobi
On Privacy Homomorphisms
In Proc. Adavances in
Cryptology-Eurocrypt'87
11. Y. Chang and M. Mitzenmacher Privacy preserving keyword searches on remote
encrypted data. In Third International Conference on Applied Cryptography and
Network Security (ACNS 2005) , volume 3531 of Lecture Notes in Computer
Science , pp. 442-455. Springer-Verlag, 2005.
12. S. Chaudhuri. An overview of query optimization in relational systems. In Proc.
of ACM Symposium on Principles of Database Systems (PODS) , 1998.
13. E. Damiani et al. Balancing Confidentiality and Eciency in Untrusted Rela-
tional DBMSs In CCS , 2003.
14. E. Damiani et al. Key Management for Multi-User Encrypted Databases In
StorageSS , 2005.
15. Data Encryption Standard (DES), NIST. FIPS 46-3. (1993)
16. J. Domingo-Ferrer A New Privacy Homomorphism and Applications In Infor-
mation Processing Letters , 6(5):277-282, 1996.
17. H. Garcia-Molina, J. Ullman, and J. Widom. Database Systems: The Complete
Book . Prentice Hall, 2002.
18. E-J. Goh Secure Indexes. Technical report 2003/216, In IACR ePrint Cryptog-
raphy Archive, (2003). See http://eprint.iacr.org/2003/216.
19. P. Golle, J. Staddon, B. Waters Secure conjunctive keyword search over en-
crypted data. In Applied Cryptography and Network Security (ACNS 2004) ,
volume 3089 of Lecture Notes in Computer Science , pp. 31-45. Springer, 2004.
20. G. Graefe. Query eveluation techniques for large databases. ACM Computing
Surveys , 25(2):73-170, 1993.
21. H. Hacıgumus, B. Hore, B. Iyer, S. Mehrotra Search on Encrypted Data. In
Secure Data Management in Decentralized Systems , Springer US, 2007.
22. H. Hacıgumus, B. Iyer, and S. Mehrotra. Providing Database as a Service. In
Proc. of ICDE , 2002.
23. H. Hacıgumus, B. Iyer, and S. Mehrotra. Ensuring the Integrity of Encrypted
Databases in Database as a Service Model. In Proc. of 17th IFIP WG 11.3
Conference on Data and Applications Security , 2003.
24. H. Hacıgumus, B. Iyer, S. Mehrotra Query Optimization in Encrypted Database
Systems, In DASFAA , 2005.
25. H. Hacıgumus. Privacy in Database-as-a-Service Model. Ph.D. Thesis, Depart-
ment of Information and Computer Science, University of California, Irvine ,
2003.
26. H. Hacıgumus, B. Iyer, C. Li and S. Mehrotra Executing SQL over encrypted
data in the database-service-provider model. In Proc. SIGMOD, 2002.
Search WWH ::




Custom Search