스마트그리드 환경에 적용 가능한 암호화된 데이터베이스 검색 기술 동향 분석 |
Kim, Gi-Sung
(고려대학교 정보경영공학전문대학원)
Kim, Dong-Min (고려대학교 정보경영공학전문대학원) Noh, Geon-Tae (고려대학교 정보경영공학전문대학원) Jeong, Ik-Rae (고려대학교 정보경영공학전문대학원) |
1 | E.J. Goh, "Secure Indexes," Technical Report 2003/216, IACR ePrint Crpytography Archive, June 2003. |
2 | P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference, June 2004. |
3 | D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt 2004, May 2004. |
4 | J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions," EUROCRYPT 2008, LNCS 4965, pp. 146-162, 2008. |
5 | Gulteckin Ozsoyoglu, David Singer, "Anti-tamper Database: Querying Encrypted Databases," In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003. |
6 | R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order Preserving Encryption for Numeric Data," In Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France June 2004. |
7 | H. Hacigümü , B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database- service-provider model," ACM SIGMOD, 2002. |
8 | E. Damiani, S.D.C.di Vimercati, S. Jajodia, S. Paraboshi and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSS," In Proc. of the 10th ACM Conf. on Computer and Communications Security(CCS), October 2003. |
9 | A. Ceselli, E. Damiani, S.D.C.D Vimercati, S. Jajoda, S. Paraboschi and P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Database," ACM Transactions on Information and System Security, Vol.8, No.1, Feb. 2005. |
10 | L. Liu, J. Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database," csie, vol. 1, pp.303-307, 2009 WRI World Congress on Computer Science and Information Engineering, 2009. |
11 | L. Liu and J. Gai, "A Method Query over Encrypted Data in Database," ICCET, Volume 01, pages 23-27, 2009. |
12 | M. Mitzenmacher. "Compressed Bloom Filter," IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp. 604-612 December 2002. DOI ScienceOn |
13 | D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO 2001, August 2001. |
14 | D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," IEEE Symp. on Security and Privacy, May 2000. |
15 | 윤인하, "최근 미국 동부지역의 정전사태와 미국 전력 사업의 문제점", Aisa-Pacific Review, 2003. |