Part 1: Privacy IInternational audienceDatabase outsourcing to semi-honest servers raises concerns against the confidentiality of sensitive information. To hide such information, an existing approach splits data among two supposedly mutually isolated servers by means of fragmentation and encryption. This approach is modelled logic-orientedly and then proved to be confidentiality preserving, even if an attacker employs some restricted but nevertheless versatile class of a priori knowledge to draw inferences. Finally, a method to compute a secure fragmentation schema is developed
AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confiden...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Abstract ing base [3]); this means that part of the system must This paper discusses how object orie...
The balance between privacy and utility is a classical problem with an increasing impact on the desi...
International audienceData outsourced to an external storage server are usually encrypted since ther...
The impact of privacy requirements in the development of modern applications is increasing very quic...
International audienceConfidentiality and privacy of outsourced data has become one of the pressing ...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. ...
Privacy requirements have an increasing impact on the realization of modern applications. Technical ...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceF...
A growing trend in today\u2019s society is outsourcing large databases to the cloud. This permits to...
Database fragmentation is a promising approach that can be used in combination with encryption to ac...
The security of database is very important as data is the most valuable asset in the modern environm...
AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confiden...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Abstract ing base [3]); this means that part of the system must This paper discusses how object orie...
The balance between privacy and utility is a classical problem with an increasing impact on the desi...
International audienceData outsourced to an external storage server are usually encrypted since ther...
The impact of privacy requirements in the development of modern applications is increasing very quic...
International audienceConfidentiality and privacy of outsourced data has become one of the pressing ...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. ...
Privacy requirements have an increasing impact on the realization of modern applications. Technical ...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceF...
A growing trend in today\u2019s society is outsourcing large databases to the cloud. This permits to...
Database fragmentation is a promising approach that can be used in combination with encryption to ac...
The security of database is very important as data is the most valuable asset in the modern environm...
AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confiden...
Modern business creates an increasing need for sharing, querying and mining informa-tion across auto...
Abstract ing base [3]); this means that part of the system must This paper discusses how object orie...