Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Database security
Self-organizing data sharing communities with SAGRES
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Communications of the ACM
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Cryptography and data security
Cryptography and data security
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Securing XML Documents with Author-X
IEEE Internet Computing
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Cryptographic Approaches to Provacy in Forensic DNA Databases
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Mariposa: a wide-area distributed database system
The VLDB Journal — The International Journal on Very Large Data Bases
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The Piazza peer data management project
ACM SIGMOD Record
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Secure Third Party Distribution of XML Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Security analysis of cryptographically controlled access to XML documents
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Journal of Cognitive Neuroscience
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
Homeviews: peer-to-peer middleware for personal data sharing applications
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
A data outsourcing architecture combining cryptography and access control
Proceedings of the 2007 ACM workshop on Computer security architecture
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Proceedings of the 2nd international conference on Scalable information systems
An access control mechanism for P2P collaborations
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Access Control Friendly Query Verification for Outsourced Data Publishing
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
iDataGuard: an interoperable security middleware for untrusted internet data storage
Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion
Detecting privacy violations in database publishing using disjoint queries
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Zerber+R: top-k retrieval from a confidential index
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Query assurance verification for outsourced multi-dimensional databases
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
XML repository searcher-browser supporting fine-grained access control
International Journal of Computers and Applications
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
ClientBased access control evaluator for XML databases
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
Data protection in outsourcing scenarios: issues and directions
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Authenticating kNN query results in data publishing
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Hasslefree: simplified access control management for XML documents
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Preserving privacy and fairness in peer-to-peer data integration
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
Keep a few: outsourcing data while maintaining confidentiality
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Distributed and secure access control in P2P databases
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
Journal of Automated Reasoning
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
Unbounded HIBE and attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
ACM Transactions on Information and System Security (TISSEC)
Private data indexes for selective access to outsourced data
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
An auto-delegation mechanism for access control systems
STM'10 Proceedings of the 6th international conference on Security and trust management
Authentication of range query results in mapreduce environments
Proceedings of the third international workshop on Cloud data management
Computational soundness about formal encryption in the presence of secret shares and key cycles
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Privacy in GLAV information integration
ICDT'07 Proceedings of the 11th international conference on Database Theory
Authenticating multi-dimensional query results in data publishing
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Password-based encryption analyzed
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
XFlat: query friendly encrypted XML view publishing
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A model of XML access control with dual-level security views
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Privacy in database publishing
ICDT'05 Proceedings of the 10th international conference on Database Theory
XML-Based declarative access control
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Dynamic access control in a concurrent object calculus
CONCUR'06 Proceedings of the 17th international conference on Concurrency Theory
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Secure query processing against encrypted XML data using Query-Aware Decryption
Information Sciences: an International Journal
Secure XML querying based on authorization graphs
Information Systems Frontiers
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Enforcing subscription-based authorization policies in cloud scenarios
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
Fundamenta Informaticae
An efficient certificateless cryptography scheme without pairing
Proceedings of the third ACM conference on Data and application security and privacy
Supporting Secure Information Flow: An Engineering Approach
International Journal of e-Collaboration
Practical constructions and new proof methods for large universe attribute-based encryption
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Access control and query verification for untrusted databases
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |
We propose a framework for enforcing access control policies on published XML documents using cryptography. In this framework the owner publishes a single data instance, which is partially encrypted, and which enforces all access control policies. Our contributions include a declarative language for access policies, and the resolution of these policies into a logical "protection model" which protects an XML tree with keys. The data owner enforces an access control policy by granting keys to users. The model is quite powerful, allowing the data owner to describe complex access scenarios, and is also quite elegant, allowing logical optimizations to be described as rewriting rules. Finally, we describe cryptographic techniques for enforcing the protection model on published data, and provide a performance analysis using real datasets.