Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.8664
Dynamic and efficient key management for access hierarchies, Proc. of CCS 2005, 2005. ,
DOI : 10.1145/1455526.1455531
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.9762
Keying Hash Functions for Message Authentication, Proc. of CRYPTO, 1996. ,
DOI : 10.1007/3-540-68697-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.8430
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System, 2008 Annual Computer Security Applications Conference (ACSAC), 2008. ,
DOI : 10.1109/ACSAC.2008.13
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948124
Fine grained access control for SOAP E-services, Proceedings of the tenth international conference on World Wide Web , WWW '01, 2001. ,
DOI : 10.1145/371920.372152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6093
A data outsourcing architecture combining cryptography and access control, Proc. of CSAW, 2007. ,
Encryption policies for regulating access to outsourced data, ACM TODS, vol.35, issue.12, pp.1-1246, 2010. ,
Robust fingerprint detection for access control, Proc. of RoboCare, 2005. ,
Executing SQL over encrypted data in the database-service-provider model, Proc. of the SIGMOD 2002, 2002. ,
A Certified Digital Signature, Proc. of CRYPTO, 1989. ,
DOI : 10.1007/0-387-34805-0_21
Controlling Access to Published Data Using Cryptography, Proc. of VLDB 2003, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.2933
Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, pp.107-138, 2006. ,
DOI : 10.1145/1149976.1149977
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2372
Verifying completeness of relational query results in data publishing, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, 2005. ,
DOI : 10.1145/1066157.1066204
Privacy Enhanced Access Control for Outsourced Data Sharing, Proc. of FC 2012. Bonaire, 2012. ,
DOI : 10.1007/978-3-642-32946-3_17
URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:138935/CONTENT/cucs-039-11.pdf
Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755690
Efficient secure query evaluation over encrypted XML databases, Proc. of VLDB, 2006. ,
Integrity auditing of outsourced data, Proc. of VLDB, 2007. ,
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2010.5462174
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems, Proc. of ISPEC 2011, 2011. ,
DOI : 10.1007/978-3-642-21031-0_7