Barazzutti et al., 2012 - Google Patents
Thrifty privacy: efficient support for privacy-preserving publish/subscribeBarazzutti et al., 2012
View PDF- Document ID
- 2002919591115049792
- Author
- Barazzutti R
- Felber P
- Mercier H
- Onica E
- Rivière E
- Publication year
- Publication venue
- Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems
External Links
Snippet
Content-based publish/subscribe is an appealing paradigm for building large-scale distributed applications. Such applications are often deployed over multiple administrative domains, some of which may not be trusted. Recent attacks in public clouds indicate that a …
- 238000001914 filtration 0 abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barazzutti et al. | Thrifty privacy: efficient support for privacy-preserving publish/subscribe | |
Li et al. | Fast range query processing with strong privacy protection for cloud computing | |
Wang et al. | Practical and secure nearest neighbor search on encrypted large-scale data | |
Ceselli et al. | Modeling and assessing inference exposure in encrypted databases | |
Wang et al. | Towards efficient verifiable conjunctive keyword search for large encrypted database | |
Bianchi et al. | ” Better than nothing” privacy with bloom filters: To what extent? | |
Wang et al. | Forward and backward-secure range-searchable symmetric encryption | |
Andola et al. | Searchable encryption on the cloud: a survey | |
Furukawa | Request-based comparable encryption | |
CN101345694A (en) | Method for fast searching, positioning and matching access control list | |
Li et al. | Enforcing secure and privacy-preserving information brokering in distributed information sharing | |
Tang et al. | Privacy preserving indexing for ehealth information networks | |
Freudiger et al. | Privacy preserving data quality assessment for high-fidelity data sharing | |
Wang et al. | Fast and secure location-based services in smart cities on outsourced data | |
Zhang et al. | Privacy-preserving network provenance | |
Miloslavskaya et al. | Survey of big data information security | |
Guo et al. | Order‐Revealing Encryption Scheme with Comparison Token for Cloud Computing | |
Manasrah et al. | An investigation study of privacy preserving in cloud computing environment | |
Salehi et al. | RESeED: A secure regular‐expression search tool for storage clouds | |
Waage et al. | Property preserving encryption in NoSQL wide column stores | |
Kamble et al. | A study on fuzzy keywords search techniques and incorporating certificateless cryptography | |
Kozak et al. | Efficiency and security in similarity cloud services | |
Sun et al. | SQL queries over encrypted databases: a survey | |
Fink et al. | Streaming, plaintext private information retrieval using regular expressions on arbitrary length search strings | |
Dou et al. | Order-hiding range query over encrypted data without search pattern leakage |