[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Barazzutti et al., 2012 - Google Patents

Thrifty privacy: efficient support for privacy-preserving publish/subscribe

Barazzutti et al., 2012

View PDF
Document ID
2002919591115049792
Author
Barazzutti R
Felber P
Mercier H
Onica E
Rivière E
Publication year
Publication venue
Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems

External Links

Snippet

Content-based publish/subscribe is an appealing paradigm for building large-scale distributed applications. Such applications are often deployed over multiple administrative domains, some of which may not be trusted. Recent attacks in public clouds indicate that a …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Barazzutti et al. Thrifty privacy: efficient support for privacy-preserving publish/subscribe
Li et al. Fast range query processing with strong privacy protection for cloud computing
Wang et al. Practical and secure nearest neighbor search on encrypted large-scale data
Ceselli et al. Modeling and assessing inference exposure in encrypted databases
Wang et al. Towards efficient verifiable conjunctive keyword search for large encrypted database
Bianchi et al. ” Better than nothing” privacy with bloom filters: To what extent?
Wang et al. Forward and backward-secure range-searchable symmetric encryption
Andola et al. Searchable encryption on the cloud: a survey
Furukawa Request-based comparable encryption
CN101345694A (en) Method for fast searching, positioning and matching access control list
Li et al. Enforcing secure and privacy-preserving information brokering in distributed information sharing
Tang et al. Privacy preserving indexing for ehealth information networks
Freudiger et al. Privacy preserving data quality assessment for high-fidelity data sharing
Wang et al. Fast and secure location-based services in smart cities on outsourced data
Zhang et al. Privacy-preserving network provenance
Miloslavskaya et al. Survey of big data information security
Guo et al. Order‐Revealing Encryption Scheme with Comparison Token for Cloud Computing
Manasrah et al. An investigation study of privacy preserving in cloud computing environment
Salehi et al. RESeED: A secure regular‐expression search tool for storage clouds
Waage et al. Property preserving encryption in NoSQL wide column stores
Kamble et al. A study on fuzzy keywords search techniques and incorporating certificateless cryptography
Kozak et al. Efficiency and security in similarity cloud services
Sun et al. SQL queries over encrypted databases: a survey
Fink et al. Streaming, plaintext private information retrieval using regular expressions on arbitrary length search strings
Dou et al. Order-hiding range query over encrypted data without search pattern leakage