Databases Reference
In-Depth Information
27. H. Hacıgumus, B. Iyer, and S. Mehrotra Ecient Execution of Aggregation
Queries over Encrypted Relational Databases. In
DASFAA
, 2004.
28. H. Hacıgumus, Sharad Mehrotra Performance concious key management in
Encrypted Databases In
DBSec
, 2004.
29. H. Hacıgumus, Sharad Mehrotra Ecient Key Updates in Encrypted Database
Systems In
Secure Data Management
, 2005.
30. B. Hore, S. Mehrotra, and G. Tsudik. A Privacy-Preserving Index for Range
Queries. In
Proc.ofVLDB
2004.
31. B. Hore. Storing and Querying Data Securely in Untrusted Environments.
Ph.D.
Thesis, Department of Information and Computer Science, University of Cali-
fornia, Irvine
, 2007.
32. B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu A Framework for
Ecient Storage Security in RDBMS In
Proc.ofEDBT
2004.
33. R. C. Jammalamadaka, S. Mehrotra, and N. Venkatasubramanian PVault: A
Client-Server System Providing Mobile Access to Personal Data In
StorageSS
,
2005.
34. R. Jammalamadaka, S. Mehrotra Querying Encrypted XML Documents In
IDEAS
, 2006.
35. R.C. Jammalamadaka, R. Gamboni, S. Mehrotra, K. Seamons, N. Venkata-
subramanian gVault:A Gmail Based Cryptographic Network File System. In
proceedings of
21st Annual IFIP WG 11.3 Working Conference on Data and
Applications Security
, 2007.
36. A. Machanavajjhala, J. E. Gehrke, D. Kifer, M. Venkitasubramaniam
l-
Diversity: Privacy Beyond k-Anonymity. In
ICDE
, 2006.
37. E. Mykletun, M. Narasimhan, G. Tsudik Authentication and Integrity in Out-
sourced Databases In
NDSS
, 2004.
38. M. Narasimhan, G. Tsudik DSAC: Integrity of Outsourced Databases with
Signature Aggregation and Chaining In
CIKM
, 2005.
39. R. Rivest, R.L. Adleman and M. Dertouzos. On Data Banks and Privacy Ho-
momorphisms. In
Foundations of Secure Computations
, 1978.
40. B. Schneier. Description of a New Variable-Length Key, 64-Bit Block Cipher
(Blowfish). Fast software Encryption, Cambridge Security Workshop Proceed-
ings. (1993) 191-204.
41. P. Sellinger, M. Astrahan, D. D. Chamberlin, R. A. Lorie, and T. G. Price.
Access Path Selection in Relational Database Management Systems. In
Proc.
of ACM SIGMOD
, 1979.
42. E., Shmueli, R. Waisenberg, Y., Elovici, E. Gudes Designing Secure Indexes for
Encrypted Databases Secure Data Management, 2004.
43. R. Sion Query Execution Assurance for Outsourced Databases In
VLDB
2005.
44. D. Song and D. Wagner and A. Perrig. Practical Techniques for Search on
Encrypted Data. In
Proc. of IEEE SRSP
, 2000.
45. H. Wang, L. Lakshmanan Ecient Secure Query Evaluation over Encrypted
XML Databases In
VLDB
, 2006.
46. B. Waters, D. Balfanz, G. Durfee, and D. Smetters Building and encrypted and
searchable audit log. In
NDSS
(2004).
47. L. Willenborg, T. De Waal Elements of Statistical Disclosure Control
Springer
,
2001.
48. L. Willenborg, T. De Waal Statistical Disclosure Control in Practice
Springer-
Verlag
, 1996.