Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
[BOOK][B] Distributed systems
AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …
Confidentiality-preserving publish/subscribe: A survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …
distributed applications running across multiple administrative domains. Pub/sub allows …
A privacy manager for cloud computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud
computing user of their private data being stolen or misused, and also assists the cloud …
computing user of their private data being stolen or misused, and also assists the cloud …
Privacy preserving policy-based content sharing in public clouds
An important problem in public clouds is how to selectively share documents based on fine-
grained attribute-based access control policies (acps). An approach is to encrypt documents …
grained attribute-based access control policies (acps). An approach is to encrypt documents …
An efficient certificateless encryption for secure data sharing in public clouds
We propose a mediated certificateless encryption scheme without pairing operations for
securely sharing sensitive information in public clouds. Mediated certificateless public key …
securely sharing sensitive information in public clouds. Mediated certificateless public key …
Secure XML querying with security views
The prevalent use of XML highlights the need for a generic, flexible access-control
mechanism for XML documents that supports efficient and secure query access, without …
mechanism for XML documents that supports efficient and secure query access, without …
Structure preserving database encryption method and system
(57) A database encryption system and method, the Structure Pre serving Database
Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with …
Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with …
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in
anonymized data publication. Such breach occurs when an adversary concludes with high …
anonymized data publication. Such breach occurs when an adversary concludes with high …
Access control for databases: Concepts and systems
As organizations depend on, possibly distributed, information systems for operational,
decisional and strategic activities, they are vulnerable to security breaches leading to data …
decisional and strategic activities, they are vulnerable to security breaches leading to data …