Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

[BOOK][B] Distributed systems

AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …

Confidentiality-preserving publish/subscribe: A survey

E Onica, P Felber, H Mercier, E Rivière - ACM computing surveys (CSUR …, 2016 - dl.acm.org
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …

A privacy manager for cloud computing

S Pearson, Y Shen, M Mowbray - … 2009, Beijing, China, December 1-4 …, 2009 - Springer
We describe a privacy manager for cloud computing, which reduces the risk to the cloud
computing user of their private data being stolen or misused, and also assists the cloud …

Privacy preserving policy-based content sharing in public clouds

M Nabeel, N Shang, E Bertino - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
An important problem in public clouds is how to selectively share documents based on fine-
grained attribute-based access control policies (acps). An approach is to encrypt documents …

An efficient certificateless encryption for secure data sharing in public clouds

SH Seo, M Nabeel, X Ding… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We propose a mediated certificateless encryption scheme without pairing operations for
securely sharing sensitive information in public clouds. Mediated certificateless public key …

Secure XML querying with security views

W Fan, CY Chan, M Garofalakis - Proceedings of the 2004 ACM …, 2004 - dl.acm.org
The prevalent use of XML highlights the need for a generic, flexible access-control
mechanism for XML documents that supports efficient and secure query access, without …

Structure preserving database encryption method and system

Y Elovici, R Waisenberg, E Shmueli - US Patent 8,639,947, 2014 - Google Patents
(57) A database encryption system and method, the Structure Pre serving Database
Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with …

Preservation of proximity privacy in publishing numerical sensitive data

J Li, Y Tao, X Xiao - Proceedings of the 2008 ACM SIGMOD international …, 2008 - dl.acm.org
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in
anonymized data publication. Such breach occurs when an adversary concludes with high …

Access control for databases: Concepts and systems

E Bertino, G Ghinita, A Kamra - Foundations and Trends® in …, 2011 - nowpublishers.com
As organizations depend on, possibly distributed, information systems for operational,
decisional and strategic activities, they are vulnerable to security breaches leading to data …