Sciweavers

Share
60 search results - page 1 / 12
» Anti-Tamper Databases: Querying Encrypted Databases
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
9 years 13 days ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
SDMW
2004
Springer
9 years 4 months ago
A Structure Preserving Database Encryption Scheme
Abstract. A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. I...
Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehu...
CIS
2004
Springer
9 years 4 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
CCS
2015
ACM
3 years 6 months ago
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
To reduce costs, organizations may outsource data storage and data processing to third-party clouds. This raises con´Čüdentiality concerns, since the outsourced data may have sens...
Omar Chowdhury, Deepak Garg 0001, Limin Jia, Anupa...
DBSEC
2006
134views Database» more  DBSEC 2006»
9 years 14 days ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
books