共 15 条
[11]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[12]
A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1981, 6 (02)
:312-328
[13]
Practical Techniques for Searches on Encrypted Data .2 Song D,Wagner D,Perrig A. Proc.of2000IEEE Symposium on Security and Privacy . 2000
[14]
Answering aggregation queries in a secure system model .2 Ge Ting-jian,Zdonik S. Proceedings of the33rd VLDB . 2007