International audienceData outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions. To overcome these problems, new proposals have been recently developed, which are based on a fragmentation technique possibly combined with encryption. The main advantage of these proposals is that they limit the use of encryption, thus improving query execution efficiency. In this paper, we describe such fragmentation-based approaches focusing in particular on the different data fragmentation models proposed in the literature. We ...
Even though cloud computing provides many intrinsic benefits (e.g., cost savings, availability, scal...
Database outsourcing has become an important research topic in recent years because of the large vol...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
International audienceData outsourced to an external storage server are usually encrypted since ther...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceF...
International audienceConfidentiality and privacy of outsourced data has become one of the pressing ...
The impact of privacy requirements in the development of modern applications is increasing very quic...
Part 1: Privacy IInternational audienceDatabase outsourcing to semi-honest servers raises concerns a...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. ...
Privacy requirements have an increasing impact on the realization of modern applications. Technical ...
The goal of this chapter is to describe the main solutions being devised for protecting data confide...
A growing trend in today\u2019s society is outsourcing large databases to the cloud. This permits to...
The balance between privacy and utility is a classical problem with an increasing impact on the desi...
Utilizing database encryption to safeguard data in several conditions where access control is not su...
Even though cloud computing provides many intrinsic benefits (e.g., cost savings, availability, scal...
Database outsourcing has become an important research topic in recent years because of the large vol...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
International audienceData outsourced to an external storage server are usually encrypted since ther...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceF...
International audienceConfidentiality and privacy of outsourced data has become one of the pressing ...
The impact of privacy requirements in the development of modern applications is increasing very quic...
Part 1: Privacy IInternational audienceDatabase outsourcing to semi-honest servers raises concerns a...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. ...
Privacy requirements have an increasing impact on the realization of modern applications. Technical ...
The goal of this chapter is to describe the main solutions being devised for protecting data confide...
A growing trend in today\u2019s society is outsourcing large databases to the cloud. This permits to...
The balance between privacy and utility is a classical problem with an increasing impact on the desi...
Utilizing database encryption to safeguard data in several conditions where access control is not su...
Even though cloud computing provides many intrinsic benefits (e.g., cost savings, availability, scal...
Database outsourcing has become an important research topic in recent years because of the large vol...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...