Browse > Article

스마트그리드 환경에 적용 가능한 암호화된 데이터베이스 검색 기술 동향 분석  

Kim, Gi-Sung (고려대학교 정보경영공학전문대학원)
Kim, Dong-Min (고려대학교 정보경영공학전문대학원)
Noh, Geon-Tae (고려대학교 정보경영공학전문대학원)
Jeong, Ik-Rae (고려대학교 정보경영공학전문대학원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 E.J. Goh, "Secure Indexes," Technical Report 2003/216, IACR ePrint Crpytography Archive, June 2003.
2 P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference, June 2004.
3 D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt 2004, May 2004.
4 J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions," EUROCRYPT 2008, LNCS 4965, pp. 146-162, 2008.
5 Gulteckin Ozsoyoglu, David Singer, "Anti-tamper Database: Querying Encrypted Databases," In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.
6 R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order Preserving Encryption for Numeric Data," In Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France June 2004.
7 H. Hacigümü , B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database- service-provider model," ACM SIGMOD, 2002.
8 E. Damiani, S.D.C.di Vimercati, S. Jajodia, S. Paraboshi and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSS," In Proc. of the 10th ACM Conf. on Computer and Communications Security(CCS), October 2003.
9 A. Ceselli, E. Damiani, S.D.C.D Vimercati, S. Jajoda, S. Paraboschi and P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Database," ACM Transactions on Information and System Security, Vol.8, No.1, Feb. 2005.
10 L. Liu, J. Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database," csie, vol. 1, pp.303-307, 2009 WRI World Congress on Computer Science and Information Engineering, 2009.
11 L. Liu and J. Gai, "A Method Query over Encrypted Data in Database," ICCET, Volume 01, pages 23-27, 2009.
12 M. Mitzenmacher. "Compressed Bloom Filter," IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp. 604-612 December 2002.   DOI   ScienceOn
13 D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO 2001, August 2001.
14 D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," IEEE Symp. on Security and Privacy, May 2000.
15 윤인하, "최근 미국 동부지역의 정전사태와 미국 전력 사업의 문제점", Aisa-Pacific Review, 2003.