Managing data and processes in cloud-enabled large-scale sensor networks: State-of-the-art and future research directions

A Cuzzocrea, G Fortino, O Rana - 2013 13th IEEE/ACM …, 2013 - ieeexplore.ieee.org
In this paper we focus on state-of-the-art analysis and open research issues in the context of
Cloud-enabled large-scale sensor networks, which naturally marry with the emerging Big …

Partially materialized digest scheme: an efficient verification method for outsourced databases

K Mouratidis, D Sacharidis, HH Pang - The VLDB Journal, 2009 - Springer
In the outsourced database model, a data owner publishes her database through a third-
party server; ie, the server hosts the data and answers user queries on behalf of the owner …

Signature bouquets: Immutability for aggregated/condensed signatures

E Mykletun, M Narasimha, G Tsudik - Computer Security–ESORICS 2004 …, 2004 - Springer
Database outsourcing is a popular industry trend which involves organizations delegating
their data management needs to an external service provider. Since a service provider is …

A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations

S Choi, G Ghinita, E Bertino - … , DEXA 2010, Bilbao, Spain, August 30 …, 2010 - Springer
Users of content-based publish/subscribe systems (CBPS) are interested in receiving data
items with values that satisfy certain conditions. Each user submits a list of subscription …

A framework for efficient storage security in RDBMS

B Iyer, S Mehrotra, E Mykletun, G Tsudik… - Advances in Database …, 2004 - Springer
With the widespread use of e-business coupled with the public's awareness of data privacy
issues and recent database security related legislations, incorporating security features into …

Processatlas: A scalable and extensible platform for business process analytics

A Beheshti, B Benatallah… - Software: Practice and …, 2018 - Wiley Online Library
In today's knowledge‐, service‐, and cloud‐based economy, an overwhelming amount of
business‐related data are being generated at a fast rate daily from a wide range of sources …

Project RESCUE: challenges in responding to the unexpected

S Mehrotra, CT Butts, D Kalashnikov… - Internet …, 2003 - spiedigitallibrary.org
This paper provides an overview of Project RESCUE, which aims to enhance the mitigation
capabilities of first responders in the event of a crisis by dramatically transforming their ability …

New paradigms for access control in open environments

E Damiani, SDC Di Vimercati… - Proceedings of the Fifth …, 2005 - ieeexplore.ieee.org
Many access control models and policies have been proposed in recent years for different
purposes. Access control is now evolving with the complex environments that it support. In …

Structural signatures for tree data structures

A Kundu, E Bertino - Proceedings of the VLDB Endowment, 2008 - dl.acm.org
Data sharing with multiple parties over a third-party distribution framework requires that both
data integrity and confidentiality be assured. One of the most widely used data organization …

Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures

L Qiu, G Kellaris, N Mamoulis, K Nissim… - Proceedings of the VLDB …, 2023 - dl.acm.org
Most cloud service providers offer limited data privacy guarantees, discouraging clients from
using them for managing their sensitive data. Cloud providers may use servers with Trusted …