Secure query processing against encrypted XML data using Query-Aware Decryption
Tài liệu tham khảo
Ahituv, 1987, Processing encrypted data, Commun. ACM, 30, 777, 10.1145/30401.30404
Apache Software Foundation, XML-Security version 1.1. Available from: <http://xml.apache.org/security/c/>, 2004.
Apache Software Foundation, Xalan-C++ version 1.8. Available from: <http://xml.apache.org/xalan-c/>, 2004.
Bertino, 2002, Secure and selective dissemination of XML documents, ACM Trans. Inform. Syst. Security, 5, 290, 10.1145/545186.545190
S. Boag et al., XQuery 1.0: An XML Query Language, W3C Working Draft, November 2003.
D. Booth et al., Web Services Architecture, W3C Working Group Note, February 2004.
N. Bruno, N. Koudas, D. Srivastava, Holistic Twig Joins: Optimal XML Pattern Matching, in: Proceedings of 2002 ACM SIGMOD International Conference on Management of Data, ACM SIGMOD, Madison, Wisconsin, June 2002, pp. 310–321.
Chan, 1996
J. Clark, S. DeRose, XML Path Language (XPath) Version 1.0, W3C Recommendation, November 1999.
Dobkin, 1979, Secure databases: protection against user influence, ACM Trans. Database Syst., 4, 97, 10.1145/320064.320068
T. Imamura, B. Dillaway, E. Simon, XML Encryption Syntax and Processing, W3C Recommendation, December 2002.
Faloutsos, 1985, Access methods for text, ACM Comput. Surveys, 17, 49, 10.1145/4078.4080
G. Miklau, D. Suciu, Controlling access to published data using cryptography, in: Proceedings of 29th International Conference on Very Large Data Bases, Berlin, Germany, September 2003, pp. 898–909.
G. Miklau, D. Suciu, A formal analysis of information disclosure in data exchange, in: Proceedings of 2004 ACM SIGMOD International Conference on Management of Data, ACM SIGMOD, Paris, France, June 2004, pp. 575–586.
Parameswaran, 2001, P2P networking: an information-sharing alternative, IEEE Comput., 34, 31, 10.1109/2.933501
A.R. Schmidt et al., XMark: A benchmark for XML data management, in: Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, August 2002, pp. 974–985.
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proceedings of 2000 IEEE Symposium on Security and Privacy, Oakland, California, May 2000, pp. 44–55.
C. Zhang et al., On supporting containment queries in relational database management systems, in: Proceedings of 2001 ACM SIGMOD International Conference on Management of Data, ACM SIGMOD, Santa Barbara, California, May 2001, pp. 425–436.