Biswas D, Vidyasankar K (2012) Privacy preserving profiling for mobile services. In: Proceedings of the international conference on mobile web information systems (MobiWIS), pp 569–576
Weikum G, Vossen G (2011) Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery. Morgan Kaufmann Publishers, Menlo Park
Google Scholar
Vidyasankar K (2009) Serializability. Encyclopedia of database systems, pp 2626–2632. doi:10.1007/978-0-387-39940-9_344
Vidyasankar K, Vossen G (2004) A multi-level model for web service composition. In: Proceedings of the IEEE international conference on web services (ICWS), pp 462–469
Biswas D, Haller S, Kerschbaum F (2010) Privacy-preserving outsourced profiling. In: Proceedings of the IEEE international conference on E-commerce technology (CEC), pp 136–143
Camenisch J, Kohlweiss M, Rial A, Sheedy C (2009) Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Proceedings of the international conference on practice and theory in public key cryptography (PKC), pp 196–214
Pallier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the international conference on the theory and application of cryptographic techniques (EUROCRYPT), pp 223–228. doi:10.1007/3-540-48910-X_16
Damgard I, Jurik M (2001) A Generalization, a simplification and some applications of Paillier’s probabilistic public-key system. In: Proceedings of the international conference on practice and theory in public key cryptography (PKC), pp 119–136
Christin D, Reinhardt A, Kanhere SS, Hollick M (2011) A survey on privacy in mobile participatory sensing applications. J Syst Softw 84(11):1928–1946. doi:10.1016/j.jss.2011.06.073
Article
Google Scholar
Afek Y, Attiya H, Dolev D, Gafni E, Merritt M, Shavit N (1993) Atomic snapshots of shared memory. J ACM 40(4):873–890
Article
MATH
Google Scholar
Biswas D, Vidyasankar K (2005) Spheres of visibility. In: Proceedings of the IEEE European conference on web services (ECOWS), pp 2–13
Kossmann D, Kraska T, Loesing S (2010) An evaluation of alternative architectures for transaction processing in the cloud. In: Proceedings of the ACM international conference on management of data (SIGMOD), pp 579–590
Williams P, Sion R, Shasha D (2009) The blind stone tablet: outsourcing durability to untrusted parties. In: Proceedings of the network and distributed system security symposium (NDSS)
Tan CC, Liu Q, Wu J (2011) Secure locking for untrusted clouds. In: Proceedings of the IEEE international conference on cloud computing (CLOUD), pp 131–138
Toubiana V, Narayanan A, Boneh D, Nissenbaum H, Barocas S (2010) Adnostic: privacy preserving targeted advertising. In: Proceedings of the network and distributed system security symposium (NDSS)
Guha S, Reznichenko A, Tang K, Haddadi H, Francis P (2009) Serving Ads from localhost for performance, privacy, and profit. In: Proceedings of the hot topics in networking (HotNets)