Sometimes there is a need to store sensitive data on an untrusted database server. Song, Wagner and Perrig have introduced a way to search for the existence of a word in an encrypted textual document. The search speed is linear in the size of the document. It does not scale well for a large database. We have developed a tree search algorithm based on the linear search algorithm that is suitable for XML databases. It is more efficient since it exploits the structure of XML. We have built prototype implementations for both the linear and the tree search case. Experiments show a major improvement in search time
Searchable public key encryption supporting conjunctive keyword search is an important technique in ...
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such...
XML is a flexible and powerful tool that enables information and security sharing in heterogeneous e...
Sometimes there is a need to store sensitive data on an untrusted database server. Song, Wagner and ...
Abstract. Sometimes there is a need to store sensitive data on an un-trusted database server. Song, ...
Song, Wagner and Perrig have published a theoretical paper about keyword search on encrypted textual...
The amount of data an average person has, is becoming so huge that in the near future this cannot be...
Keyword search is a proven, user-friendly way to query HTML documents in the World Wide Web. We prop...
Abstract. In order to accelerate execution of various matching and navigation operations on collecti...
We propose the concept of selective document retrieval (SDR) from an encrypted database which allows...
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin...
Abstract—In contrast to XML query languages as e.g. XPath which require knowledge on the query langu...
Several times one came across a situation where efficient searching on XML files needs to be perform...
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy pres...
The rapid emergence of XML as a standard for data representation and exchange over the Web has spark...
Searchable public key encryption supporting conjunctive keyword search is an important technique in ...
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such...
XML is a flexible and powerful tool that enables information and security sharing in heterogeneous e...
Sometimes there is a need to store sensitive data on an untrusted database server. Song, Wagner and ...
Abstract. Sometimes there is a need to store sensitive data on an un-trusted database server. Song, ...
Song, Wagner and Perrig have published a theoretical paper about keyword search on encrypted textual...
The amount of data an average person has, is becoming so huge that in the near future this cannot be...
Keyword search is a proven, user-friendly way to query HTML documents in the World Wide Web. We prop...
Abstract. In order to accelerate execution of various matching and navigation operations on collecti...
We propose the concept of selective document retrieval (SDR) from an encrypted database which allows...
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin...
Abstract—In contrast to XML query languages as e.g. XPath which require knowledge on the query langu...
Several times one came across a situation where efficient searching on XML files needs to be perform...
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy pres...
The rapid emergence of XML as a standard for data representation and exchange over the Web has spark...
Searchable public key encryption supporting conjunctive keyword search is an important technique in ...
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such...
XML is a flexible and powerful tool that enables information and security sharing in heterogeneous e...