Practical server privacy with secure coprocessors
SW Smith, D Safford - IBM Systems Journal, 2001 - ieeexplore.ieee.org
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that this access is completely private—even to the operator of this …
in a way that ensures that this access is completely private—even to the operator of this …
Chip-secured data access: Confidential data on untrusted servers
L Bouganim, P Pucheral - VLDB'02: Proceedings of the 28th International …, 2002 - Elsevier
Publisher Summary The rapid growth of ubiquitous computing impels mobile users to store
personal data on the Web to increase its availability. In the same way, corporate databases …
personal data on the Web to increase its availability. In the same way, corporate databases …
Blind custodians: A database service architecture that supports privacy without encryption
A Motro, F Parisi-Presicce - IFIP Annual Conference on Data and …, 2005 - Springer
We describe an architecture for a database service that does not assume that the service
provider can be trusted. Unlike other architectures that address this problem, this …
provider can be trusted. Unlike other architectures that address this problem, this …
[PDF][PDF] Database security and privacy
S Jajodia - ACM Computing Surveys (CSUR), 1996 - dl.acm.org
—Policy. The first step is to develop a security or privacy policy. The policy precisely defines
the requirements that are to be implemented within the hardware and software of the …
the requirements that are to be implemented within the hardware and software of the …
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo… - The VLDB …, 2010 - inria.hal.science
An increasing amount of personal data is automatically gathered and stored on servers by
administrations, hospitals, insurance companies, etc. Citizen themselves often count on …
administrations, hospitals, insurance companies, etc. Citizen themselves often count on …
Protecting client privacy with trusted computing at the server
A Iliev, SW Smith - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Current trusted-computing initiatives usually involve large organizations putting physically
secure hardware on user machines, potentially violating user privacy. Yet, it's possible to …
secure hardware on user machines, potentially violating user privacy. Yet, it's possible to …
Practical privacy: the SuLQ framework
We consider a statistical database in which a trusted administrator introduces noise to the
query responses with the goal of maintaining privacy of individual database entries. In such …
query responses with the goal of maintaining privacy of individual database entries. In such …
Interactive privacy via the median mechanism
A Roth, T Roughgarden - Proceedings of the forty-second ACM …, 2010 - dl.acm.org
We define a new interactive differentially private mechanism---the median mechanism---for
answering arbitrary predicate queries that arrive online. Given fixed accuracy and privacy …
answering arbitrary predicate queries that arrive online. Given fixed accuracy and privacy …
Two can keep a secret: A distributed architecture for secure database services
G Aggarwal, M Bawa, P Ganesan, H Garcia-Molina… - CIDR …, 2005 - ilpubs.stanford.edu
Recent trends towards database outsourcing, as well as concerns and laws governing data
privacy, have led to great interest in enabling secure database services. Previous …
privacy, have led to great interest in enabling secure database services. Previous …
Obfuscated databases and group privacy
A Narayanan, V Shmatikov - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
We investigate whether it is possible to encrypt a database and then give it away in such a
form that users can still access it, but only in a restricted way. In contrast to conventional …
form that users can still access it, but only in a restricted way. In contrast to conventional …