Practical server privacy with secure coprocessors

SW Smith, D Safford - IBM Systems Journal, 2001 - ieeexplore.ieee.org
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that this access is completely private—even to the operator of this …

Chip-secured data access: Confidential data on untrusted servers

L Bouganim, P Pucheral - VLDB'02: Proceedings of the 28th International …, 2002 - Elsevier
Publisher Summary The rapid growth of ubiquitous computing impels mobile users to store
personal data on the Web to increase its availability. In the same way, corporate databases …

Blind custodians: A database service architecture that supports privacy without encryption

A Motro, F Parisi-Presicce - IFIP Annual Conference on Data and …, 2005 - Springer
We describe an architecture for a database service that does not assume that the service
provider can be trusted. Unlike other architectures that address this problem, this …

[PDF][PDF] Database security and privacy

S Jajodia - ACM Computing Surveys (CSUR), 1996 - dl.acm.org
—Policy. The first step is to develop a security or privacy policy. The policy precisely defines
the requirements that are to be implemented within the hardware and software of the …

Secure personal data servers: a vision paper

T Allard, N Anciaux, L Bouganim, Y Guo… - The VLDB …, 2010 - inria.hal.science
An increasing amount of personal data is automatically gathered and stored on servers by
administrations, hospitals, insurance companies, etc. Citizen themselves often count on …

Protecting client privacy with trusted computing at the server

A Iliev, SW Smith - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Current trusted-computing initiatives usually involve large organizations putting physically
secure hardware on user machines, potentially violating user privacy. Yet, it's possible to …

Practical privacy: the SuLQ framework

A Blum, C Dwork, F McSherry, K Nissim - Proceedings of the twenty …, 2005 - dl.acm.org
We consider a statistical database in which a trusted administrator introduces noise to the
query responses with the goal of maintaining privacy of individual database entries. In such …

Interactive privacy via the median mechanism

A Roth, T Roughgarden - Proceedings of the forty-second ACM …, 2010 - dl.acm.org
We define a new interactive differentially private mechanism---the median mechanism---for
answering arbitrary predicate queries that arrive online. Given fixed accuracy and privacy …

Two can keep a secret: A distributed architecture for secure database services

G Aggarwal, M Bawa, P Ganesan, H Garcia-Molina… - CIDR …, 2005 - ilpubs.stanford.edu
Recent trends towards database outsourcing, as well as concerns and laws governing data
privacy, have led to great interest in enabling secure database services. Previous …

Obfuscated databases and group privacy

A Narayanan, V Shmatikov - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
We investigate whether it is possible to encrypt a database and then give it away in such a
form that users can still access it, but only in a restricted way. In contrast to conventional …