共 50 条
- [1] Ensuring the integrity of encrypted databases in the database-as-a-service model [J]. DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 61 - 74
- [2] A Survey on Querying Encrypted Data for Database as a Service [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
- [3] A Retrieve Model of WESU for Encrypted XML Database [J]. 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
- [4] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
- [6] PARALLEL PROCESSING OF ENCRYPTED XML DOCUMENTS IN DATABASE AS A SERVICE CONCEPT [J]. INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (04): : 301 - 309
- [8] Information Processing for Encrypted Database [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255
- [9] A security analysis for encrypted database [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
- [10] Nonlinear order preserving index for encrypted database query in service cloud environments [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (13): : 1967 - 1984