共 26 条
[1]
Alhanjouri M., Al Derawi A.M., A new method of query over encrypted data in database using hash map, International Journal of Computer Applications, 41, 4, pp. 975-8887, (2012)
[2]
Ali A., Mazhar Afzal D., Database security: Threats and solutions, International Journal of Engineering Inventions, 6, 2, pp. 2278-7461, (2017)
[3]
Al-Saraireh J., An efficient approach for query processing over encrypted database, Journal of Computer Science, 13, 10, pp. 548-557, (2017)
[4]
Alsirhani A., Bodorik P., Sampalli S., Improving database security in cloud computing by fragmentation of data, International Conference on Computer and Applications (ICCA), pp. 43-49, (2017)
[5]
Arasu A., Et al., Querying encrypted data, Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data - SIGMOD '14, pp. 1259-1261, (2014)
[6]
Guo C., Et al., Fine-grained database field search using attribute-based encryption for e-healthcare clouds, Journal of Medical Systems, 40, 11, pp. 235-242, (2016)
[7]
Hacigumus H., Et al., Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data - SIGMOD '02, pp. 216-227, (2002)
[8]
Hacigumus H., Iyer B., Mehrotra S., Efficient execution of aggregation queries over encrypted relational databases, Database Systems for Advances Applications, 9th International Conference, pp. 125-136, (2004)
[9]
Hore B., Mehrotra S., Tsudik G., A privacy-preserving index for range queries, Proceedings of the Thirtieth International Conference on Very Large Data Bases, 30, pp. 720-731, (2004)
[10]
Li J., Omiecinski E.R., Efficiency and security trade-off in supporting range queries on encrypted databases, Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 69-83, (2005)