A data outsourcing architecture combining cryptography and access control
- 2 November 2007
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- On Key Assignment for Hierarchical Access ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Key management for multi-user encrypted databasesPublished by Association for Computing Machinery (ACM) ,2005
- Dynamic and efficient key management for access hierarchiesPublished by Association for Computing Machinery (ACM) ,2005
- Modeling and assessing inference exposure in encrypted databasesACM Transactions on Information and System Security, 2005
- Order preserving encryption for numeric dataPublished by Association for Computing Machinery (ACM) ,2004
- Efficient Execution of Aggregation Queries over Encrypted Relational DatabasesLecture Notes in Computer Science, 2004
- Cryptographic access control in a distributed file systemPublished by Association for Computing Machinery (ACM) ,2003
- Executing SQL over encrypted data in the database-service-provider modelPublished by Association for Computing Machinery (ACM) ,2002
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- Protection and the control of information sharing in multicsCommunications of the ACM, 1974