Privacy preserving policy-based content sharing in public clouds
An important problem in public clouds is how to selectively share documents based on fine-
grained attribute-based access control policies (acps). An approach is to encrypt documents …
grained attribute-based access control policies (acps). An approach is to encrypt documents …
[图书][B] Security for web services and service-oriented architectures
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …
erent application environments. Web services based on the eXt-sible Markup Language …
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness,
which can be verified by the client using the data owner's signature. Previous authentication …
which can be verified by the client using the data owner's signature. Previous authentication …
Tls-n: Non-repudiation over tls enabling ubiquitous content signing
An internet user wanting to share observed content is typically restricted to primitive
techniques such as screenshots, web caches or share button-like solutions. These …
techniques such as screenshots, web caches or share button-like solutions. These …
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin… - … and Network Security …, 2010 - Springer
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for
trees which support public redaction of subtrees (by third-party distributors) while pertaining …
trees which support public redaction of subtrees (by third-party distributors) while pertaining …
A privacy-preserving approach to policy-based content dissemination
We propose a novel scheme for selective distribution of content, encoded as documents,
that preserves the privacy of the users to whom the documents are delivered and is based …
that preserves the privacy of the users to whom the documents are delivered and is based …
Concerto: A high concurrency key-value store with integrity
A Arasu, K Eguro, R Kaushik, D Kossmann… - Proceedings of the …, 2017 - dl.acm.org
Verifying the integrity of outsourced data is a classic, well-studied problem. However current
techniques have fundamental performance and concurrency limitations for update-heavy …
techniques have fundamental performance and concurrency limitations for update-heavy …
Authenticated index structures for aggregation queries
Query authentication is an essential component in Outsourced DataBase (ODB) systems.
This article introduces efficient index structures for authenticating aggregation queries over …
This article introduces efficient index structures for authenticating aggregation queries over …
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database
functionality to a third-party service provider, which answers queries received from clients …
functionality to a third-party service provider, which answers queries received from clients …
Redactable document signatures
S Haber, WG Horne, M Zhang - US Patent 10,237,074, 2019 - Google Patents
In one implementation, a redactable document signature system includes an encoding
engine, a reordering engine, and a signature engine. The encoding engine is to access a …
engine, a reordering engine, and a signature engine. The encoding engine is to access a …