This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic Databases, In: Proc. 28th International Conference on Very Large Databases (VLDB’02), Hong Kong, China, 143–157
Akl SG, Taylor PD (1983) Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transaction in Computer Systems, 1(3):239–248
Bertino E, Carminati B, Ferrari E (2002) A Temporal Key Management Scheme for Broadcasting XML Documents. In: Proc. 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, VA, 31–40
Bertino E, Ferrari E (2002) Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security, 5(3):290–331
Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A (2004) Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10):1263–1278
Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, 416–432
Carminati B, Ferrari E, Bertino E (2005) Securing XML Data in Third-Party Distribution Systems. In: Proc. ACM 14th Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 99–106
Carminati B, Ferrari E, Bertino E (2005) Assuring Security Properties in Third-party Architectures. In: Proc. 21st International Conference on Data Engineering (ICDE’05), Tokyo, Japan, 574–548
Carminati B, Ferrari E (2006) Confidentiality Enforcement for XML Outsourced Data. In: Proc. 2nd EDBT Workshop on Database Technologies for Handling XML Information on the Web (DATAX’06), Munich, Germany
Charanjit S, Yung M (1996) Paytree: Amortized Signature for Flexible Micropayments. In: Proc. 2nd Usenix Workshop on Electronic Commerce, Oakland, CA, 213–221
Cockcroft S, Clutterbuck P (2001) Attitudes Towards Information Privacy. In: Proc. 12th Australasian Conference on Information Systems, Coffs Harbour, NSW, Australia
Chor B, Goldreich O, Kushilevitz E, Sudan M (1999) Private Information Retrieval. Journal of the ACM, 45(6):965–982
Devanbu P, Gertz M, Martel C, Stubblebine SG (2000) Authentic Third-party Data Publication. In: Proc. 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, the Netherlands, 101–112
Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG (2001) Flexible Authentication of XML Documents. In: Proc. 8th ACM Conference on Computer and Communications Security (CCS’01), Philadelphia, PA, 136–145
Hacigumus H, Iyer B, Li C, Mehrotra S (2002) Executing SQL over Encrypted Data in the Database Service Provider Model. In: Proc. ACM SIGMOD’2002, Madison, Wisconsin, 216–227
Hacigumus H, Iyer B, Mehrotra S (2002) Providing Database as a Service. In: Proc. 18th International Conference on Data Engineering (ICDE’02), San Jose, CA, 29
Hacigumus H, Iyer B, Li C, Mehrotra S (2004) Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Proc. 9th International Conference on Database Systems for Advanced Applications (DASFAA’04), Jeju Island, Korea, 125–136
Matheus A (2005) Declaration and Enforcement of Fine-grained Access Restrictions for a Service-based Geospatial Data Infrastructure. In: Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05), Stockholm, Sweden, 21–28
Mykletun E, Narasimha M, Tsudik G (2006) Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2(2):107–138
Merkle RC (1989) A Certified Digital Signature. In: Proc. of Advances in Cryptology, Santa Barbara, CA, 218–238
Naor M, Nissim K (2000) Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications, 18(4):561–570
Narasimha M, Tsudik G (2005) DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining. In: Proc. ACM Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 235–236
OASIS Consortium, eXtensible Access Control Markup Language (XACML) (version 1.1), http://www.oasis-open.org/committees/xacml/
OGC Open Geospatial Consortium, Geography Markup Language (version 3.1.1), http://portal.opengeospatial.org/files/?artifact_id=4700
Rivest R, Adleman L, M Dertouzos (1978) On Data Banks and Privacy Homomorphisms. In: Foundations of Secure Computation, Academic Press Inc., 171–179
Song DX, Wagner D, Perrig A (2000) Practical Techniques for Searches on Encrypted Data. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, 44–55
Stallings W (2000) Network Security Essentials: Applications and Standards. Prentice Hall
World Wide Web Consortium, http://www.w3.org
Web Feature Service Interface Standard, http://www.opengeospatial.org/docs/02-058.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Carminati, B., Ferrari, E. (2007). Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures. In: Belussi, A., Catania, B., Clementini, E., Ferrari, E. (eds) Spatial Data on the Web. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69878-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-69878-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69877-7
Online ISBN: 978-3-540-69878-4
eBook Packages: Computer ScienceComputer Science (R0)