咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 7 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 网络空间安全

主题

  • 7 篇 query on encrypt...
  • 3 篇 database securit...
  • 3 篇 encrypted databa...
  • 2 篇 range query
  • 2 篇 searchable encry...
  • 2 篇 dbaas
  • 2 篇 cloud computing
  • 2 篇 privacy
  • 1 篇 secure database
  • 1 篇 data privacy
  • 1 篇 abe
  • 1 篇 multi-level thre...
  • 1 篇 cp-abe
  • 1 篇 database-as-a-se...
  • 1 篇 database outsour...
  • 1 篇 data encryption
  • 1 篇 attribute based ...
  • 1 篇 deterministic en...
  • 1 篇 cloud security
  • 1 篇 constant size ci...

机构

  • 2 篇 univ teknol mala...
  • 1 篇 hang seng manage...
  • 1 篇 univ hong kong d...
  • 1 篇 kong ju univ dep...
  • 1 篇 asian pacific un...
  • 1 篇 beijing jiaotong...
  • 1 篇 institute of inf...
  • 1 篇 vsu comp sci nel...
  • 1 篇 ucti univ asian ...
  • 1 篇 south china agr ...
  • 1 篇 etri cryptog res...

作者

  • 2 篇 mehrabani zahra
  • 2 篇 ravan rama rosha...
  • 2 篇 idris norbik bas...
  • 1 篇 jho nam-su
  • 1 篇 syed sadia
  • 1 篇 hong dowon
  • 1 篇 li rongbin
  • 1 篇 seo changho
  • 1 篇 ma sha
  • 1 篇 yiu siu ming
  • 1 篇 jiang jianguo
  • 1 篇 teja p. srinivas
  • 1 篇 li bin
  • 1 篇 cheung david wai...
  • 1 篇 kao ben
  • 1 篇 wong wai kit
  • 1 篇 chang ku-young

语言

  • 7 篇 英文
检索条件"主题词=Query on Encrypted Data"
7 条 记 录,以下是1-10 订阅
排序:
A SECURE METHOD AGAINST FREQUENCY ATTACK FOR PATTERN query ON encrypted STRING data
A SECURE METHOD AGAINST FREQUENCY ATTACK FOR PATTERN QUERY O...
收藏 引用
International Conference on Informatics and Creative Multimedia (ICICM)
作者: Ravan, Rama Roshan Idris, Norbik Bashah Mehrabani, Zahra Univ Teknol Malaysia Adv Informat Sch Kuala Lumpur Malaysia Asian Pacific Univ UCTI Univ Kuala Lumpur Malaysia
Using database encryption to protect data in some situations where access control is not solely enough is inevitable. database encryption provides an additional layer of protection to conventional access control techn... 详细信息
来源: 评论
Authorized Equi-join for Multiple data Contributors in the PKC-Based Setting
收藏 引用
COMPUTER JOURNAL 2017年 第12期60卷 1822-1838页
作者: Ma, Sha South China Agr Univ Coll Math & Informat 483 Wushan Rd Guangzhou 510642 Guangdong Peoples R China
The database-As-a-Service (DaaS) model provides seamless mechanisms for database management and service. As a countermeasure to security treats, encryption technologies have been widely adopted in database systems. Ac... 详细信息
来源: 评论
Symmetric searchable encryption with efficient range query using multi-layered linked chains
收藏 引用
JOURNAL OF SUPERCOMPUTING 2016年 第11期72卷 4233-4246页
作者: Jho, Nam-Su Chang, Ku-Young Hong, Dowon Seo, Changho ETRI Cryptog Res Team Daejeon South Korea Kong Ju Univ Dept Math Sci Gong Ju Chungcheongnam South Korea
Searchable encryption is an encryption system which provides confidentiality of stored documents and usability of document search at the same time. Remote cloud storage is the most typical application for searchable e... 详细信息
来源: 评论
Search on encrypted data: State of Arts
Search on Encrypted Data: State of Arts
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Li Bin Jiang Jianguo Beijing Jiaotong University Institute of Information Engineering Chinese Academy of Sciences
Search on encrypted data is a method that can effectively search over ciphertext of data stored in the untrusted database and return correct results to querier,such that the querier can correctly decrypt the results.A... 详细信息
来源: 评论
Novel data Storage and Retrieval in Cloud database by using Frequent Access Node Encryption
Novel Data Storage and Retrieval in Cloud Database by using ...
收藏 引用
proc 2014 inter conf contemporary comp informatics (ic3i)
作者: Syed, Sadia Teja, P. Srinivas VSU Comp Sci Nellore India
Cloud computing has the advantage that it offers companies unlimited data storage at attractive costs. However, it also introduces new challenges for protecting the confidentiality of the data, and the access to the d... 详细信息
来源: 评论
Secure query Processing with data Interoperability in a Cloud database Environment  14
Secure Query Processing with Data Interoperability in a Clou...
收藏 引用
ACM SIGMOD International Conference on Management of data
作者: Wong, Wai Kit Kao, Ben Cheung, David Wai Lok Li, Rongbin Yiu, Siu Ming Hang Seng Management Coll Dept Comp Hong Kong Peoples R China Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China
We address security issues in a cloud database system which employs the DBaaS model. In such a model, a data owner (DO) exports its data to a cloud database service provider (SP). To provide data security, sensitive d... 详细信息
来源: 评论
A Survey on querying encrypted data for database as a Service
A Survey on Querying Encrypted Data for Database as a Servic...
收藏 引用
5th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
作者: Ravan, Rama Roshan Idris, Norbik Bashah Mehrabani, Zahra Univ Teknol Malaysia Adv Informat Sch Kuala Lumpur Malaysia UCTI Univ Asian Pacific Univ Kuala Lumpur Malaysia
using database encryption to protect data in some situations where access control is not solely enough is inevitable. database encryption provides an additional layer of protection to conventional access control techn... 详细信息
来源: 评论