Author:
Henrich Christian,Huber Matthias,Kempka Carmen,Müller-Quade Jörn,Strefler Mario
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Vouk, M.A.: Cloud computing - issues, research and implementations. In: ITI 2008. 30th int. conf. on information technology interfaces, pp. 31–40. IEEE, Los Alamitos (2008)
2. Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. HP Laboratories (2009)
3. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 78–88. ACM, New York (2006)
4. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574. ACM, New York (2004)
5. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB 2004, Proceedings, pp. 720–731. ACM, New York (2004)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security and Privacy in Cloud Computing;IEEE Communications Surveys & Tutorials;2013