咨询与建议

限定检索结果

文献类型

  • 38 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 46 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 12 篇 信息与通信工程
    • 9 篇 软件工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 3 篇 控制科学与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 环境科学与工程(可...
  • 14 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 2 篇 经济学
    • 1 篇 理论经济学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 59 篇 database encrypt...
  • 7 篇 database outsour...
  • 6 篇 key management
  • 6 篇 cloud computing
  • 5 篇 order-preserving...
  • 4 篇 data privacy
  • 4 篇 encrypted index ...
  • 3 篇 database securit...
  • 3 篇 outsourcing comp...
  • 3 篇 order-revealing ...
  • 3 篇 information secu...
  • 3 篇 security
  • 3 篇 cryptography
  • 2 篇 cloud database
  • 2 篇 relational datab...
  • 2 篇 secure index
  • 2 篇 query efficiency
  • 2 篇 query
  • 2 篇 aes algorithm
  • 2 篇 order preserving...

机构

  • 3 篇 chonbuk natl uni...
  • 2 篇 elect & telecomm...
  • 2 篇 jeonbuk natl uni...
  • 2 篇 csiro ict ctr ma...
  • 1 篇 rose hulman inst...
  • 1 篇 hallym univ comp...
  • 1 篇 microsoft res re...
  • 1 篇 georgetown univ ...
  • 1 篇 miami univ dept ...
  • 1 篇 school of comput...
  • 1 篇 peoples armed po...
  • 1 篇 zhejiang univ co...
  • 1 篇 kyushu univ dept...
  • 1 篇 swiss fed inst t...
  • 1 篇 calif state univ...
  • 1 篇 univ sci vnu hcm...
  • 1 篇 kongju natl univ...
  • 1 篇 chonbuk natl uni...
  • 1 篇 mohammed v univ ...
  • 1 篇 ben gurion univ ...

作者

  • 6 篇 chang jae-woo
  • 5 篇 kim hyeong-il
  • 5 篇 kim hyeong-jin
  • 3 篇 kim kee sung
  • 2 篇 hue t. b. p.
  • 2 篇 jho nam-su
  • 2 篇 kim hyoungshick
  • 2 篇 echizen i.
  • 2 篇 choi jusop
  • 2 篇 thuc d. n.
  • 2 篇 wohlgemuth s.
  • 2 篇 wang shenlu
  • 2 篇 liu dongxi
  • 2 篇 thuy t. b. d.
  • 1 篇 grigore elena mi...
  • 1 篇 li yanqiu
  • 1 篇 huang qi-chun
  • 1 篇 deshpande varad
  • 1 篇 kharmoum nassim
  • 1 篇 李现伟

语言

  • 54 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"主题词=database encryption"
59 条 记 录,以下是31-40 订阅
排序:
Performance evaluation on encrypted - non encrypted database fields containing IoT data  19
Performance evaluation on encrypted - non encrypted database...
收藏 引用
23rd Annual International Symposium database Applications and Engineering (IDEAS)
作者: Asiminidis, Christodoulos Georgiadis, Ioannis Syndoukas, Dimitrios Kokkonis, George Kontogiannis, Sotirios Univ Ioannina Dept Math Lab Team Distributed Microcomp Syst Ioannina Greece Techn Edu Inst Western Macedonia Dept Business Adm Grevena Greece
Encrypted data transmitted from secure wireless channels as part of Internet of Things (IoT) infrastructures are mainly stored in database tables using plaintext records. As IoT data content confidence in supportive A... 详细信息
来源: 评论
Protecting Access Pattern Privacy in database Outsourcing Service
Protecting Access Pattern Privacy in Database Outsourcing Se...
收藏 引用
IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
作者: Hue, T. B. P. Thuc, D. N. Thuy, T. B. D. Echizen, I. Wohlgemuth, S. Univ Sci VNU HCMC 227 Nguyen CuDist 5 Ho Chi Minh City Vietnam Natl Inst Informat Chiyoda Ku Tokyo Japan
The fact that the data owners outsource their data to external service providers introduces many security and privacy issues. Among them, the most significant research questions relate to data confidentiality and user... 详细信息
来源: 评论
A Secure Range Query Processing Algorithm for the Encrypted database on the Cloud  1
收藏 引用
11th International Scientific Conference on Future Information Technology (FutureTech) / 10th International Conference on Multimedia and Ubiquitous Engineering (MUE)
作者: Kim, Hyeong-Il Choi, Munchul Kim, Hyeong-Jin Chang, Jae-Woo Jeonbuk Natl Univ Dept Comp Engn Jeonju South Korea
Secure range query processing algorithms have been studied as the range query can be used as a baseline technique in various fields. However, when processing a range query, the existing methods fail to hide the data a... 详细信息
来源: 评论
Randomly Partitioned encryption for Cloud databases
Randomly Partitioned Encryption for Cloud Databases
收藏 引用
28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC)
作者: Sanamrad, Tahmineh Braun, Lucas Kossmann, Donald Venkatesan, Ramarathnam Swiss Fed Inst Technol Syst Grp Dept Comp Sci Zurich Switzerland Microsoft Res Redmond CA USA
With the current advances in Cloud Computing, outsourcing data has never been so tempting. Along with outsourcing a database comes the privacy versus performance discussion. Order-Preserving encryption (OPE) is one of... 详细信息
来源: 评论
An integrated approach for database security and fault tolerance
An integrated approach for database security and fault toler...
收藏 引用
International Conference on Information Technology - Coding and Computing
作者: Zhang, CN Zhong, H Univ Regina Dept Comp Sci Regina SK S4S 0A2 Canada
This paper proposes a systematic approach to integrate database security (including database encryption and authentication) and fault tolerance so that the total overheads can be significantly reduced. An improved dat... 详细信息
来源: 评论
Model-Driven Application-Level encryption for the Privacy of E-Health Data
Model-Driven Application-Level Encryption for the Privacy of...
收藏 引用
5th International Conference on Availability, Reliability and Security
作者: Ding, Yun Klein, Karsten InterComponentWare AG R&D Basis Technol Walldorf Germany
We propose a novel model-driven application-level encryption solution to protect the privacy and confidentiality of health data in response to the growing public concern about the privacy of health data. Domain expert... 详细信息
来源: 评论
Nonlinear order preserving index for encrypted database query in service cloud environments
Nonlinear order preserving index for encrypted database quer...
收藏 引用
2nd international workshop on workflow management in service and cloud computing
作者: Liu, Dongxi Wang, Shenlu CSIRO ICT Ctr Marsfield NSW 2122 Australia
The database services on cloud are appearing as an attractive way of outsourcing databases. When a database is deployed on a cloud database service, the data security and privacy becomes a big concern for users. A str... 详细信息
来源: 评论
Efficient Searching Over Encrypted database: Methodology and Algorithms  15th
Efficient Searching Over Encrypted Database: Methodology and...
收藏 引用
15th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Deshpande, Varad Das, Debasis BITS Pilani Dept CS&IS KK Birla Goa Campus Zuarinagar 403726 Goa India
database encryption is a process in which the data stored in the database are converted from plaintext (PT) to ciphertext (CT). The original data can be retrieved from the ciphertext with the help of a predefined key ... 详细信息
来源: 评论
An Efficient Fine-grained Access Control Mechanism for database Outsourcing Service
An Efficient Fine-grained Access Control Mechanism for Datab...
收藏 引用
3rd International Conference on Information Security and Intelligent Control (ISIC)
作者: Hue, T. B. P. Luyen, G. N. Kha, N. D. Wohlgemuth, S. Echizen, I. Thuc, D. N. Thuy, T. B. D. Univ Sci VNU HCMC 227 Nguyen Cu Ho Chi Minh City Vietnam Natl Inst Informat Tokyo Japan
In database outsourcing service, the data owners store their databases at the servers which belong to potentially untrusted service providers. It is necessary to protect outsourced data from unauthorized access. Howev... 详细信息
来源: 评论
A study of UniSQL encryption system: Case study of developing SAMS
A study of UniSQL encryption system: Case study of developin...
收藏 引用
9th International Conference on Advanced Communication Technology (ICACT 2007)
作者: Kim, Yong Soon Hong, Eui Kyeong KERIS NEIS Ctr 22-1 Ssangnim Dong Seoul 100400 South Korea Univ Seoul Dept Comp Sci Seoul South Korea
SAMS (School Affairs Management System) was developed as one of the subsequent NEIS (National Education Information System) e-Government projects by Ministry of Education and Human Resource Development (MOE&HRD) i... 详细信息
来源: 评论