1 |
R. Fagin, "Combining Fuzzy Information from Multiple Systems," Proceedings of the 15th ACM SIGACT-SIGMOD- SIGART Symposium on Principles of Database Systems, pp.216-226, 1996.
|
2 |
R. Fagin, A. Lotem, and M. Naor, "Optimal Aggregation Algorithms for Middleware," Proceedings of the 21th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp.102-113, 2001.
|
3 |
J. W. Kim and K. S. Candna, "Skip-and-prune: Cosine-based Top-k Query Processing for Efficient Context-sensitive Document Retrieval," Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp.115-126, 2009.
|
4 |
S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, "Answering Aggregation Queries in a Secure System Model," Proceedings of the 33th International Conference on Very Large Data Bases, pp.519-530, 2007.
|
5 |
C. Doulkeridis and K. Norvag, "Processing Analytical Queries over Encrypted Data in MapReduce," Proceedings of the VLDB Endowment, pp.289-300, 2013.
|
6 |
W. K. Wongm, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu, "Secure Query Processing with Data Interoperability in a Cloud Database Environment," Proceedings of the 40th ACM SIGMOD International Conference on Management of Data, pp.1395-1406, 2014.
|
7 |
C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proceedings of the 41th Annual ACM Symposium on Theory of Computing, pp.169-178, 2009.
|
8 |
P. Paillier, "Public-key Cryptosystems Based on Composite Degree Residuosity Classes," Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, pp.223-238, 1999.
|
9 |
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order Preserving Encryption for Numeric Data," Proceedings of the 30th ACM SIGMOD International Conference on Management of Data, pp.563-574, 2004.
|
10 |
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving Symmetric Encryption," Proceedings of the 28th EUROCRYPT, pp.224-241, 2009.
|
11 |
TPC-H [Internet], http://www.tpc.org/tpch.
|