Search - Data and Applications Security and Privacy XXVII Access content directly

Filter your results

2 results
Keywords : Cloud computing
Image document

Access Control and Query Verification for Untrusted Databases

Rohit Jain , Sunil Prabhakar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers hal-01490706v1
Image document

Result Integrity Verification of Outsourced Frequent Itemset Mining

Boxiang Dong , Ruilin Liu , Hui (wendy) Wang
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.258-265, ⟨10.1007/978-3-642-39256-6_17⟩
Conference papers hal-01490709v1