Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures

  • Barbara Carminati
  • Elena Ferrari


Range Query Data Owner Access Control Policy Encrypt Data Query Answer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic Databases, In: Proc. 28th International Conference on Very Large Databases (VLDB’02), Hong Kong, China, 143–157Google Scholar
  2. 2.
    Akl SG, Taylor PD (1983) Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transaction in Computer Systems, 1(3):239–248CrossRefGoogle Scholar
  3. 3.
    Bertino E, Carminati B, Ferrari E (2002) A Temporal Key Management Scheme for Broadcasting XML Documents. In: Proc. 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, VA, 31–40Google Scholar
  4. 4.
    Bertino E, Ferrari E (2002) Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security, 5(3):290–331CrossRefGoogle Scholar
  5. 5.
    Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A (2004) Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10):1263–1278CrossRefGoogle Scholar
  6. 6.
    Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, 416–432Google Scholar
  7. 7.
    Carminati B, Ferrari E, Bertino E (2005) Securing XML Data in Third-Party Distribution Systems. In: Proc. ACM 14th Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 99–106Google Scholar
  8. 8.
    Carminati B, Ferrari E, Bertino E (2005) Assuring Security Properties in Third-party Architectures. In: Proc. 21st International Conference on Data Engineering (ICDE’05), Tokyo, Japan, 574–548Google Scholar
  9. 9.
    Carminati B, Ferrari E (2006) Confidentiality Enforcement for XML Outsourced Data. In: Proc. 2nd EDBT Workshop on Database Technologies for Handling XML Information on the Web (DATAX’06), Munich, GermanyGoogle Scholar
  10. 10.
    Charanjit S, Yung M (1996) Paytree: Amortized Signature for Flexible Micropayments. In: Proc. 2nd Usenix Workshop on Electronic Commerce, Oakland, CA, 213–221Google Scholar
  11. 11.
    Cockcroft S, Clutterbuck P (2001) Attitudes Towards Information Privacy. In: Proc. 12th Australasian Conference on Information Systems, Coffs Harbour, NSW, AustraliaGoogle Scholar
  12. 12.
    Chor B, Goldreich O, Kushilevitz E, Sudan M (1999) Private Information Retrieval. Journal of the ACM, 45(6):965–982CrossRefGoogle Scholar
  13. 13.
    Devanbu P, Gertz M, Martel C, Stubblebine SG (2000) Authentic Third-party Data Publication. In: Proc. 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, the Netherlands, 101–112Google Scholar
  14. 14.
    Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG (2001) Flexible Authentication of XML Documents. In: Proc. 8th ACM Conference on Computer and Communications Security (CCS’01), Philadelphia, PA, 136–145Google Scholar
  15. 15.
    Hacigumus H, Iyer B, Li C, Mehrotra S (2002) Executing SQL over Encrypted Data in the Database Service Provider Model. In: Proc. ACM SIGMOD’2002, Madison, Wisconsin, 216–227Google Scholar
  16. 16.
    Hacigumus H, Iyer B, Mehrotra S (2002) Providing Database as a Service. In: Proc. 18th International Conference on Data Engineering (ICDE’02), San Jose, CA, 29Google Scholar
  17. 17.
    Hacigumus H, Iyer B, Li C, Mehrotra S (2004) Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Proc. 9th International Conference on Database Systems for Advanced Applications (DASFAA’04), Jeju Island, Korea, 125–136Google Scholar
  18. 18.
    Matheus A (2005) Declaration and Enforcement of Fine-grained Access Restrictions for a Service-based Geospatial Data Infrastructure. In: Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05), Stockholm, Sweden, 21–28Google Scholar
  19. 19.
    Mykletun E, Narasimha M, Tsudik G (2006) Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2(2):107–138CrossRefGoogle Scholar
  20. 20.
    Merkle RC (1989) A Certified Digital Signature. In: Proc. of Advances in Cryptology, Santa Barbara, CA, 218–238Google Scholar
  21. 21.
    Naor M, Nissim K (2000) Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications, 18(4):561–570CrossRefGoogle Scholar
  22. 22.
    Narasimha M, Tsudik G (2005) DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining. In: Proc. ACM Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 235–236Google Scholar
  23. 23.
    OASIS Consortium, eXtensible Access Control Markup Language (XACML) (version 1.1), Scholar
  24. 24.
    OGC Open Geospatial Consortium, Geography Markup Language (version 3.1.1), Scholar
  25. 25.
    Rivest R, Adleman L, M Dertouzos (1978) On Data Banks and Privacy Homomorphisms. In: Foundations of Secure Computation, Academic Press Inc., 171–179Google Scholar
  26. 26.
    Song DX, Wagner D, Perrig A (2000) Practical Techniques for Searches on Encrypted Data. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, 44–55Google Scholar
  27. 27.
    Stallings W (2000) Network Security Essentials: Applications and Standards. Prentice HallGoogle Scholar
  28. 28.
    World Wide Web Consortium, http://www.w3.orgGoogle Scholar
  29. 29.
    Web Feature Service Interface Standard, Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Barbara Carminati
    • 1
  • Elena Ferrari
    • 1
  1. 1.University of InsubriaVareseItaly

Personalised recommendations