Sciweavers

80 search results - page 9 / 16
» Constant-Round Private Database Queries
Sort
View
144
Voted

Publication
311views
16 years 9 months ago
Towards Privacy-Aware Location-Based Database Servers
The wide spread of location-based services results in a strong market for location-detection devices (e.g., GPS-like devices, RFIDs, handheld devices, and cellular phones). Example...
Mohamed F. Mokbel
DASFAA
2010
IEEE
168views Database» more  DASFAA 2010»
14 years 11 months ago
A Large Scale Key-Value Store Based on Range-Key Skip Graph and Its Applications
An overlay network called Range-key Skip Graph (RKSG) has been proposed that can perform range-to-range search on peer-topeer network. In this paper, we propose a large scale key-v...
Susumu Takeuchi, Jun Shinomiya, Toru Shiraki, Yosh...
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
15 years 11 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
SISW
2003
IEEE
15 years 2 months ago
Implementation of a Storage Mechanism for Untrusted DBMSs
Several architectures have been recently proposed that store relational data in encrypted form on untrusted relational databases. Such architectures permit the creation of novel I...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
105
Voted
ICDT
2011
ACM
213views Database» more  ICDT 2011»
14 years 27 days ago
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parame...
Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Ju...