共 9 条
[1]
Executing SQL over en-crypted data in the database-service-provider model. HACIGUMUS H,IYER B,LI Chen,et al. Proceedings of the ACM SIGMOD International Conference on Management of Data . 2002
[2]
Providing database as a service. HACIGUMUS H,IYER B,MEHROTRA S. Proc of the18th International Conference on Data Engi-neering . 2002
[3]
Efficient execution of aggregation queries over encrypted relational databases. MEHROTRA S,,HACIGUMUS H,IYER B. Proc of the9th International Conference on Database Systems for Advanced Applications . 2004
[4]
Secure computation of the k th-ranked element. ARRARWAL G,MISHRA N,PINKS B. Proc of International Conference on the Theo-ry and Applications of Cryptographic Techniques . 2004
[5]
Distributing data for secure database services. THOMAS F,VIGNESH G,MOLINA H,et al. . 2007
[6]
Security issues in querying encrypted data. Kantarcioglu M,Clifton C. . 2004
[7]
Two Can Keep A Secret: A Distributed Architecture for Secure Database Services. Gagan Aggarwal,Mayank Bawa,Prasanna Ganesan, et al. Second Biennial Conference on Innovative Data Systems Research . 2005
[8]
Order preserving encryption for numeric data. Agrawal R,Kierman J,Srikant R,et al. Proc of ACM SIGMOND2004 . 2004
[9]
Trusted Computing Group TPM specification Version 1.2. Trusted Computing Group. http://www.trustedcomputinggroup.org . 2003