A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Global optimization of histograms
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Database Systems Concepts
Database Systems: The Complete Book
Database Systems: The Complete Book
Accurate estimation of the number of tuples satisfying a condition
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Histogram-Based Approximation of Set-Valued Query-Answers
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Trust Is not Enough: Privacy and Security in ASP and Web Service Environments
ADBIS '02 Proceedings of the 6th East European Conference on Advances in Databases and Information Systems
Materializing views with minimal size to answer queries
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Implementation of a Storage Mechanism for Untrusted DBMSs
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Mobile databases: a selection of open issues and research directions
ACM SIGMOD Record
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Modeling and assessing inference exposure in encrypted databases
ACM Transactions on Information and System Security (TISSEC)
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Secure Third Party Distribution of XML Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Safe data sharing and data dissemination on smart devices
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Pvault: a client server system providing mobile access to personal data
Proceedings of the 2005 ACM workshop on Storage security and survivability
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Simultaneous scalability and security for data-intensive web applications
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Answering queries using materialized views with minimum size
The VLDB Journal — The International Journal on Very Large Data Bases
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
Masking page reference patterns in encryption databases on untrusted storage
Data & Knowledge Engineering - Special issue: ER 2004
Journal of Cognitive Neuroscience
A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
GhostDB: querying visible and hidden data without leaks
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Improving mobile database access over wide-area networks without degrading consistency
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
A data outsourcing architecture combining cryptography and access control
Proceedings of the 2007 ACM workshop on Computer security architecture
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Privacy-preserving indexing of documents on the network
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Chip-secured data access: reconciling access rights with data encryption
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Answering aggregation queries in a secure system model
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
GhostDB: hiding data from prying eyes
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Verifying Completeness of Relational Query Answers from Online Servers
ACM Transactions on Information and System Security (TISSEC)
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Providing freshness guarantees for outsourced databases
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
A survey on querying encrypted XML documents for databases as a service
ACM SIGMOD Record
Middleware support for protecting personal data from web based data services
Proceedings of the 4th on Middleware doctoral symposium
Shared and Searchable Encrypted Data for Untrusted Servers
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy-preserving data analytics as an outsourced service
Proceedings of the 2008 ACM workshop on Secure web services
Dual encryption for query integrity assurance
Proceedings of the 17th ACM conference on Information and knowledge management
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
iDataGuard: an interoperable security middleware for untrusted internet data storage
Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion
Teaching database security and auditing
Proceedings of the 40th ACM technical symposium on Computer science education
Zerber+R: top-k retrieval from a confidential index
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Distributed and Parallel Databases
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Privacy-Preserving Queries for a DAS Model Using Encrypted Bloom Filter
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Search-as-a-service: Outsourced search over outsourced storage
ACM Transactions on the Web (TWEB)
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Privacy-preserving indexing of documents on the network
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
On indexing and information disclosure measure for efficient cryptograph query
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
COP: privacy-preserving multidimensional partition in DAS paradigm
Proceedings of the 2009 EDBT/ICDT Workshops
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Proceedings of the 13th International Conference on Extending Database Technology
Data protection in outsourcing scenarios: issues and directions
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Provably-secure schemes for basic query support in outsourced databases
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
gVault: a gmail based cryptographic network file system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Design and analysis of querying encrypted data in relational databases
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Deterministic and efficiently searchable encryption
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Data privacy - problems and solutions
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Time and space efficient algorithms for two-party authenticated data structures
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A secure multi-dimensional partition based index in DAS
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Combining fragmentation and encryption to protect privacy in data storage
ACM Transactions on Information and System Security (TISSEC)
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
SafeQ: secure and efficient query processing in sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Efficient privacy-preserving similar document detection
The VLDB Journal — The International Journal on Very Large Data Bases
Techniques for policy enforcement on encrypted network traffic
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
On securing untrusted clouds with cryptography
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Verifying spatial queries using Voronoi neighbors
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Authenticated Index Structures for Aggregation Queries
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving queries over relational databases
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
ECDL'10 Proceedings of the 14th European conference on Research and advanced technology for digital libraries
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
RASP: efficient multidimensional range query on attack-resilient encrypted databases
Proceedings of the first ACM conference on Data and application security and privacy
Efficient audit-based compliance for relational data retention
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Distributing data for secure database services
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
TrustedDB: a trusted hardware based database with privacy and data confidentiality
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Privacy preserving query processing on secret share based data storage
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Efficient techniques for privacy-preserving sharing of sensitive information
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Query processing in private data outsourcing using anonymization
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
An index structure for private data outsourcing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Privacy-aware DaaS services composition
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
A comprehensive framework for secure query processing on relational data in the cloud
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Supporting concurrency in private data outsourcing
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
CryptDB: protecting confidentiality with encrypted query processing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
A new privacy-preserving scheme DOSPA for SaaS
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Private data indexes for selective access to outsourced data
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A privacy-preserving join on outsourced database
ISC'11 Proceedings of the 14th international conference on Information security
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
Fast query over encrypted character data in database
CIS'04 Proceedings of the First international conference on Computational and Information Science
Aggregation queries in the database-as-a-service model
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Authentication of outsourced databases using signature aggregation and chaining
DASFAA'06 Proceedings of the 11th international conference on Database Systems for Advanced Applications
Efficient key updates in encrypted database systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Query log perturbation method for privacy preserving query
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Multiple sensitive association protection in the outsourced database
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy preserving data mining services on the web
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
An efficient approach to support querying secure outsourced XML information
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Designing secure indexes for encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Efficiency and security trade-off in supporting range queries on encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Security issues in querying encrypted data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Blind custodians: a database service architecture that supports privacy without encryption
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Query optimization in encrypted database systems
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers
iTrust'05 Proceedings of the Third international conference on Trust Management
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
SPIDER: an autonomic computing approach to database security management
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Privacy-preserving queries on encrypted data
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Confidentiality enforcement for XML outsourced data
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
GUC-Secure join operator in distributed relational database
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
EISA – an enterprise application security solution for databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
Distributing Data for Secure Database Services
Transactions on Data Privacy
JustMyFriends: full SQL, full transactional amenities, and access privacy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Collusion-resistant outsourcing of private set intersection
Proceedings of the 27th Annual ACM Symposium on Applied Computing
News: EU questions stability of the Internet
Network Security
News: NSS uncovers firewall shortcomings
Network Security
Feature: DataVault: secure mobile access and data sharing
Network Security
Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
SQL on an encrypted database: technical perspective
Communications of the ACM
CryptDB: processing queries on an encrypted database
Communications of the ACM
Integrity verification of cloud-hosted data analytics computations
Proceedings of the 1st International Workshop on Cloud Intelligence
Security limitations of using secret sharing for data outsourcing
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Enforcing subscription-based authorization policies in cloud scenarios
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Secure and privacy-preserving data services in the cloud: a data centric view
Proceedings of the VLDB Endowment
Executing SQL queries over encrypted character strings in the Database-As-Service model
Knowledge-Based Systems
Fragmentation and encryption to enforce privacy in data storage
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Encryption techniques for secure database outsourcing
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Selective document retrieval from encrypted database
ISC'12 Proceedings of the 15th international conference on Information Security
AUDIO: an integrity auditing framework of outlier-mining-as-a-service systems
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Database Size Estimation by Query Performance -- A Complexity Aspect
UCC '12 Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
Privacy- and integrity-preserving range queries in sensor networks
IEEE/ACM Transactions on Networking (TON)
Privacy-aware searching with oblivious term matching for cloud storage
The Journal of Supercomputing
iBigTable: practical data integrity for bigtable in public cloud
Proceedings of the third ACM conference on Data and application security and privacy
Supporting security and consistency for cloud database
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Provable Security for Outsourcing Database Operations
International Journal of Information Security and Privacy
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
Information Resources Management Journal
Controlled joining on encrypted relational database
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Compromising privacy in precise query protocols
Proceedings of the 16th International Conference on Extending Database Technology
Updating outsourced anatomized private databases
Proceedings of the 16th International Conference on Extending Database Technology
Confidentiality-Preserving query execution of fragmented outsourced data
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Efficient tree pattern queries on encrypted XML documents
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Hub: heterogeneous bucketization for database outsourcing
Proceedings of the 2013 international workshop on Security in cloud computing
Enabling secure query processing in the cloud using fully homomorphic encryption
Proceedings of the Second Workshop on Data Analytics in the Cloud
Processing analytical queries over encrypted data
Proceedings of the VLDB Endowment
Supporting complex queries and access policies for multi-user encrypted databases
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Using safety constraint for transactional dataset anonymization
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Optimal re-encryption strategy for joins in encrypted databases
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Result integrity verification of outsourced frequent itemset mining
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Modeling and Respecting Privacy Specification when Composing DaaS Services*
International Journal of Web Services Research
eSkyline: processing skyline queries over encrypted data
Proceedings of the VLDB Endowment
TMS: a trusted mail repository service using public storage clouds
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing
Inference attack against encrypted range queries on outsourced databases
Proceedings of the 4th ACM conference on Data and application security and privacy
A Patient Privacy Protection Scheme for Medical Information System
Journal of Medical Systems
Dividing secrets to secure data outsourcing
Information Sciences: an International Journal
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
Distributed and Parallel Databases
Supporting concurrency and multiple indexes in private access to outsourced data
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.03 |
Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.