Databases Reference
In-Depth Information
27. H. Hacıgumus, B. Iyer, and S. Mehrotra Ecient Execution of Aggregation
Queries over Encrypted Relational Databases. In DASFAA , 2004.
28. H. Hacıgumus, Sharad Mehrotra Performance concious key management in
Encrypted Databases In DBSec , 2004.
29. H. Hacıgumus, Sharad Mehrotra Ecient Key Updates in Encrypted Database
Systems In Secure Data Management , 2005.
30. B. Hore, S. Mehrotra, and G. Tsudik. A Privacy-Preserving Index for Range
Queries. In Proc.ofVLDB 2004.
31. B. Hore. Storing and Querying Data Securely in Untrusted Environments. Ph.D.
Thesis, Department of Information and Computer Science, University of Cali-
fornia, Irvine , 2007.
32. B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu A Framework for
Ecient Storage Security in RDBMS In Proc.ofEDBT 2004.
33. R. C. Jammalamadaka, S. Mehrotra, and N. Venkatasubramanian PVault: A
Client-Server System Providing Mobile Access to Personal Data In StorageSS ,
2005.
34. R. Jammalamadaka, S. Mehrotra Querying Encrypted XML Documents In
IDEAS , 2006.
35. R.C. Jammalamadaka, R. Gamboni, S. Mehrotra, K. Seamons, N. Venkata-
subramanian gVault:A Gmail Based Cryptographic Network File System. In
proceedings of 21st Annual IFIP WG 11.3 Working Conference on Data and
Applications Security , 2007.
36. A. Machanavajjhala, J. E. Gehrke, D. Kifer, M. Venkitasubramaniam
l-
Diversity: Privacy Beyond k-Anonymity. In ICDE , 2006.
37. E. Mykletun, M. Narasimhan, G. Tsudik Authentication and Integrity in Out-
sourced Databases In NDSS , 2004.
38. M. Narasimhan, G. Tsudik DSAC: Integrity of Outsourced Databases with
Signature Aggregation and Chaining In CIKM , 2005.
39. R. Rivest, R.L. Adleman and M. Dertouzos. On Data Banks and Privacy Ho-
momorphisms. In Foundations of Secure Computations , 1978.
40. B. Schneier. Description of a New Variable-Length Key, 64-Bit Block Cipher
(Blowfish). Fast software Encryption, Cambridge Security Workshop Proceed-
ings. (1993) 191-204.
41. P. Sellinger, M. Astrahan, D. D. Chamberlin, R. A. Lorie, and T. G. Price.
Access Path Selection in Relational Database Management Systems. In Proc.
of ACM SIGMOD , 1979.
42. E., Shmueli, R. Waisenberg, Y., Elovici, E. Gudes Designing Secure Indexes for
Encrypted Databases Secure Data Management, 2004.
43. R. Sion Query Execution Assurance for Outsourced Databases In VLDB 2005.
44. D. Song and D. Wagner and A. Perrig. Practical Techniques for Search on
Encrypted Data. In Proc. of IEEE SRSP , 2000.
45. H. Wang, L. Lakshmanan Ecient Secure Query Evaluation over Encrypted
XML Databases In VLDB , 2006.
46. B. Waters, D. Balfanz, G. Durfee, and D. Smetters Building and encrypted and
searchable audit log. In NDSS (2004).
47. L. Willenborg, T. De Waal Elements of Statistical Disclosure Control Springer ,
2001.
48. L. Willenborg, T. De Waal Statistical Disclosure Control in Practice Springer-
Verlag , 1996.
Search WWH ::




Custom Search