共 15 条
- [1] Abadi D.J., Data management in the cloud: Limitations and opportunities, Data Engineering Bulletin Issues, 32, 1, pp. 3-12, (2009)
- [2] Qi Y.-N., Atallah M.J., Efficient privacy-preserving k-nearest neighbor search, Proceedings of the International Conference on Distributed Computing System (ICDCS), pp. 311-319, (2009)
- [3] Agrawal R., Kirenan J., Srikant R., Xu Y.-R., Order-preserving encryption for numeric data, Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 563-574, (2004)
- [4] Ozsoyoglu G., Singer D.A., Chung S.S., Anti-tamper databases: Querying encrypted databases, Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Application Security, pp. 133-146, (2003)
- [5] Gentry C., Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), pp. 169-178, (2009)
- [6] Hacigumus H., Bala L., Li C., Et al., Executing SQL over encrypted data in the database-service-provider model, Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 216-227, (2002)
- [7] Wang H.-C., Du X.-Y., Wang J.-P., Yang P.-P., STBucket: A self-turning bucket index in DAS paradigm, Proceedings of the 4th ChinaGrid Annual Conference, pp. 102-109, (2009)
- [8] Song W., Peng Z.-Y., Cheng F.-Q., Et al., A service-oriented adaptive search method over encrypted data in trusted database, Chinese Journal of Computers, 33, 8, pp. 1324-1338, (2010)
- [9] Hore B., Mehrotra S., Tsudik G., A privacy-preserving index for range queries, Proceedings of the 30th International Conference on Very Large Databases (VLDB), pp. 720-731, (2004)
- [10] Ciriani V., de Capitani di Vimercati S., Foresti S., Et al., Fragmentation design for efficient query execution over sensitive distributed databases, Proceedings of the ICDCS'09, pp. 29-32, (2009)