Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Agrawal, R., Kierman, J., Srikant, R., and Xu, Y. (2004) “Order preserving encryption for numeric data”, in Proc. of ACM SIGMOD 2004, France |
Sách, tạp chí |
Tiêu đề: |
Order preserving encryption for numeric data |
|
[2] Atallah, M. J., Frikken, K. B. and Blaton, M. (2005) “Dynamic and Efficient Key Management for Access Hierarchies”, ACM |
Sách, tạp chí |
Tiêu đề: |
Dynamic and Efficient Key Management for Access Hierarchies |
|
[3] Beak, K. H., Smith, S. W. and Kotz, D. (2004), “A Survey of WPA and 802.11i RSN Authentication Protocols”, Dartmouth College Computer Science, Technical Report TR2004-524 |
Sách, tạp chí |
Tiêu đề: |
A Survey of WPA and 802.11i RSN Authentication Protocols |
Tác giả: |
Beak, K. H., Smith, S. W. and Kotz, D |
Năm: |
2004 |
|
[4] Blundo, C., Cimato, S., De Capitani di Vimercati, S., De Santis, A., Foresti, S., Paraboschi, S. and Samarati, P. (2009) “Efficient Key Management for Enforcing Access Control in Outsourced Scenarios”, Springer, IFIP |
Sách, tạp chí |
Tiêu đề: |
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios |
|
[5] Boneh, D. Crescenzo, G. D. Ostrovsky, R. and Persiano, G. (2004) “Public-key encryption with keyword search”, in Proc. of Eurocrypt |
Sách, tạp chí |
Tiêu đề: |
Public-key encryption with keyword search |
|
[6] Boyens, C. and Gunter, O. (2003) “Using online services in untrusted environments – a privacy-preserving architecture”, in Proc. of the 11 th European Conference on Information Systems (ECIS ’03), Italy |
Sách, tạp chí |
Tiêu đề: |
Using online services in untrusted environments – a privacy-preserving architecture |
|
[7] Burmester, M., Desmedt, Y., Wright, R.N., and Yasinsac, A. (2004) “Accountable privacy”, in Proc. of the 12 th International Workshop on Security Protocols, pp. 83- 95 |
Sách, tạp chí |
Tiêu đề: |
Accountable privacy |
|
[8] Carlisle, A., Steve, L. (2003) “Understanding PKI: concepts, standards, and deployment considerations”, Addison-Wesley Professional, ISBN 978-0-672-32391- 1, pages 11-15 |
Sách, tạp chí |
Tiêu đề: |
Understanding PKI: concepts, standards, and deployment considerations |
|
[9] Chang, Y. C., and Mitzenmacher, M. (2004) “Privacy preserving keyword searches on remote encrypted data”, Cryptology ePrint Archive, Report 2004/051, http://eprint.iacr.org/2004/051/ |
Sách, tạp chí |
Tiêu đề: |
Privacy preserving keyword searches on remote encrypted data |
|
[10] Chen, A. (2010) “GCreep: Google engineer stalked teens, spied on chats”,Gawker, http://gawker.com/5637234/ |
Sách, tạp chí |
Tiêu đề: |
GCreep: Google engineer stalked teens, spied on chats”,"Gawker |
|
[11] Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. (1995) “Private Information Retrieval”, in Proc. of the 36 th IEEE Conference on the Foundations of Computer Sciences, pp. 41-50 |
Sách, tạp chí |
Tiêu đề: |
Private Information Retrieval |
|
[12] Clifford Neuman B., Theodore Ts'o, (1994) “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications, Vol. 32, No. 9, pages 33-38 |
Sách, tạp chí |
Tiêu đề: |
Kerberos: An Authentication Service for Computer Networks |
|
[13] Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., and Samarati, P. (2005), “Key Management for Multi-User Encrypted Databases”, in Proc. of the 2005 ACM Workshop on Storage Security and Survivability, pp.74-83 |
Sách, tạp chí |
Tiêu đề: |
Key Management for Multi-User Encrypted Databases |
Tác giả: |
Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., and Samarati, P |
Năm: |
2005 |
|
[14] Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. and Samarati P. (2005) “Metadata Management in Outsourced Encrypted Databases”, in Secure Data Management, pages 16-32 |
Sách, tạp chí |
Tiêu đề: |
Metadata Management in Outsourced Encrypted Databases |
|
[15] Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S. and Samarati, P. (2003) “Balancing confidentiality and efficiency in untrusted relational DBMSs”, in Proc. of the 10 th ACM Conference on Computer and Communication Security, USA, pp. 93- 102 |
Sách, tạp chí |
Tiêu đề: |
Balancing confidentiality and efficiency in untrusted relational DBMSs |
|
[16] Dang, T. K. (2009) “Security Issues in Outsourced XML Databases”, Chapter 11 in the book titled "Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies", IGI Global, ISBN 978-1-60566-308-1, pages 231-261 |
Sách, tạp chí |
Tiêu đề: |
Security Issues in Outsourced XML Databases”, Chapter 11 in the book titled "Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies |
|
[24] Google, Health Privacy Policy, http://www.google.com/intl/en- US/health/privacy.html |
Link |
|
[34] Microsoft (2009), HealthVault Privacy Policy, https://account.healthvault.com/help.aspx?topicid=PrivacyPolicy |
Link |
|
[38] Oracle Corporation, Sun Directory Server Enterprise Edition 7.0 Reference, Part 1, Chapter 5, http://docs.oracle.com/cd/E19424-01/820-4811/gdzeq/index.html |
Link |
|
[39] Oracle Corporation, Using the SFTP Transport, http://docs.oracle.com/cd/E13171_01/alsb/docs261/sftptransport/transport.html#wp- 1098277 |
Link |
|