Computationally Private Information Retrieval with Polylogarithmic Communication, Proc. of EUROCRYPT, 1999. ,
DOI : 10.1007/3-540-48910-X_28
URL : http://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Private%20Information%20Retrieval/Computationally%20Private%20Information%20Retrieval%20with%20Polylogarithmic%20Communication.pdf
Over-encryption: Management of access control evolution on outsourced data, Proc. of VLDB, 2007. ,
Encryption policies for regulating access to outsourced data, ACM TODS, vol.35, issue.12, pp.1-1246, 2010. ,
Private data indexes for selective access to outsourced data, Proc. of WPES 2011, 2011. ,
Efficient and private access to outsourced data, Proc. of ICDCS, 2011. ,
Supporting concurrency and multiple indexes in private access to outsourced data, JCS, vol.21, issue.3, pp.425-461, 2013. ,
Shuffle index: Efficient and private access to outsourced data, ACM TOS, vol.11, issue.19, pp.1-1955, 2015. ,
Three-server swapping for access confidentiality, IEEE TCC, pp.pre-print, 2016. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180418
Executing SQL over encrypted data in the database-service-provider model, Proc. of SIGMOD, 2002. ,
Fault tolerance management in IaaS clouds, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), 2012. ,
DOI : 10.1109/ESTEL.2012.6400113
Supporting Security Requirements for Resource Management in Cloud Computing, 2012 IEEE 15th International Conference on Computational Science and Engineering, 2012. ,
DOI : 10.1109/ICCSE.2012.32
URL : http://spdp.dti.unimi.it/papers/JPS.CSE2012.pdf
Hiding Traversal of Tree Structured Data from Untrusted Data Stores, Proc. of WOSIS, 2004. ,
DOI : 10.1007/3-540-44853-5_35
A Survey of Single-Database Private Information Retrieval: Techniques and Applications, Proc. of PKC, 2007. ,
DOI : 10.1007/978-3-540-71677-8_26
Cloud Security, Encyclopedia on Cloud Computing, 2016. ,
DOI : 10.1109/TCC.2013.18
ObliviStore: High Performance Oblivious Cloud Storage, 2013 IEEE Symposium on Security and Privacy, 2013. ,
DOI : 10.1109/SP.2013.25
URL : http://doi.org/10.1109/sp.2013.25
Path ORAM, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516660
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1467-1479, 2012. ,
DOI : 10.1109/TPDS.2011.282
Building castles out of mud, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455790