With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers. However, under open networks and not …
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We …
S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints without having to trust the service …
H Hu, J Xu, C Ren, B Choi - 2011 IEEE 27th International …, 2011 - ieeexplore.ieee.org
Query processing that preserves both the data privacy of the owner and the query privacy of the client is a new research problem. It shows increasing importance as cloud computing …
The impact of privacy requirements in the development of modern applications is increasing very quickly. Many commercial and legal regulations are driving the need to develop reliable …
Current access control models typically assume that resources are under the strict custody of a trusted party which monitors each access request to verify if it is compliant with the …
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their storage …
The second volume of this popular handbook demonstrates the richness and breadth of the IS and IT disciplines. The book explores their close links to the practice of using, managing …
Ensuring proper privacy and protection of the information stored, communicated, processed, and disseminated in the cloud as well as of the users accessing such an information is one …