Список литературы к разделу «Обработка запросов над зашифрованными базами данных (Processing Queries on an Encrypted Database )»

From CryptoWiki
Jump to: navigation, search

Contents

L10

Linthicum, D.S. Cloud computing and SOA convergence in your enterprise: A step-by-step guide. // Addison-Wesley Professional, 2010. — P. 265.

Назад

PoReZeBa11

Popa R.A., Redfield C.M.S., Zeldovich N., Balakrishnan H. CryptDB: Protecting Confidentiality with Encrypted Query Processing. // Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP). — ACM, October 2011. — P. 85-110.

Назад

HaIyLiMe02

Hacigumus H., Iyer B., Li C., Mehrota S. Executing SQL over Encrypted Data in the Database-Service-Provider Model. // Proceedings of the 2002 ACM SIGMOD international conference on Management of data. — ACM, 2002. — P. 216-227.

Назад

TuKaMaZe13

Tu S., Frans Kaashoek M., Madden S., Zeldovich N. Processing Analytical Queries over Encrypted Data. // Proceedings of the VLDB Endowment. — March 2013. — Vol. 6, Issue 5. — P. 289-300.

Назад

CuJoPo11

Curino C., Jones E.P.C., Popa R.A. et al. Relational Cloud: A Database-as-a-Service for the Cloud. // 5th Biennial Conference on Innovative Data Research. — January 2011. — P. 235-240.

Назад

ArEgJoKaKoRa15

Arasu A., Eguro K., Joglekar M., Kaushik R., Kossmann D., Ramamurthy R. Transaction Processing on Confidential Data using Cipherbase. // IEEE 31st International Conference on Data Engineering (ICDE). — Seoul, 2015. — P. 435 – 446.

Назад