Privacy preserving policy-based content sharing in public clouds

M Nabeel, N Shang, E Bertino - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
An important problem in public clouds is how to selectively share documents based on fine-
grained attribute-based access control policies (acps). An approach is to encrypt documents …

[图书][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

Authenticated join processing in outsourced databases

Y Yang, D Papadias, S Papadopoulos… - Proceedings of the 2009 …, 2009 - dl.acm.org
Database outsourcing requires that a query server constructs a proof of result correctness,
which can be verified by the client using the data owner's signature. Previous authentication …

Tls-n: Non-repudiation over tls enabling ubiquitous content signing

H Ritzdorf, K Wust, A Gervais, G Felley… - … 2018 Network and …, 2018 - discovery.ucl.ac.uk
An internet user wanting to share observed content is typically restricted to primitive
techniques such as screenshots, web caches or share button-like solutions. These …

Redactable signatures for tree-structured data: Definitions and constructions

C Brzuska, H Busch, O Dagdelen, M Fischlin… - … and Network Security …, 2010 - Springer
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for
trees which support public redaction of subtrees (by third-party distributors) while pertaining …

A privacy-preserving approach to policy-based content dissemination

N Shang, M Nabeel, F Paci… - 2010 IEEE 26th …, 2010 - ieeexplore.ieee.org
We propose a novel scheme for selective distribution of content, encoded as documents,
that preserves the privacy of the users to whom the documents are delivered and is based …

Concerto: A high concurrency key-value store with integrity

A Arasu, K Eguro, R Kaushik, D Kossmann… - Proceedings of the …, 2017 - dl.acm.org
Verifying the integrity of outsourced data is a classic, well-studied problem. However current
techniques have fundamental performance and concurrency limitations for update-heavy …

Authenticated index structures for aggregation queries

F Li, M Hadjieleftheriou, G Kollios… - ACM Transactions on …, 2010 - dl.acm.org
Query authentication is an essential component in Outsourced DataBase (ODB) systems.
This article introduces efficient index structures for authenticating aggregation queries over …

Continuous authentication on relational streams

S Papadopoulos, Y Yang, D Papadias - The VLDB Journal, 2010 - Springer
According to the database outsourcing model, a data owner delegates database
functionality to a third-party service provider, which answers queries received from clients …

Redactable document signatures

S Haber, WG Horne, M Zhang - US Patent 10,237,074, 2019 - Google Patents
In one implementation, a redactable document signature system includes an encoding
engine, a reordering engine, and a signature engine. The encoding engine is to access a …