[1]
H.Hacigumus, B.Iyer, C.Li, et al. Executing SQL over encrypted data in the database-service- provider model[C]. In Proc. of ACM Conference on Management of Data,USA, 2002:216-227.
DOI: 10.1145/2213836.2370917
Google Scholar
[2]
L.FF, M.Hadjieleftheriou, G.Kollios. Dynamic authenticated index structures for outsourced databases[C]. In Proc. of ACM Conference on Management of Data, USA, 2006:121-132.
DOI: 10.1145/1142473.1142488
Google Scholar
[3]
Y. Yang, S. Papadopoulos, D. Papadias, et al. Authenticated Indexing for Outsourced Spatial Databases. The VLDB Journal, 2009, 118(3):631-648.
DOI: 10.1007/s00778-008-0113-2
Google Scholar
[4]
M. Xie, H. Wang, J. Yin, et al. Integrity Auditing of Outsourced Data. In Proc. of the 30th Conference on Very Large Databases, Austria, 2007:782-793.
Google Scholar
[5]
H.Hacigumus, B.Iyer, S.Mehrotra. Providing database as a service[C]. In Proc. of International Conference on Data Engineering (ICDE), 2002: 29-40.
DOI: 10.1109/icde.2002.994695
Google Scholar
[6]
B. Hore, S. Mehrotra, G. Tsudik. A Privacy-Index for Range Queries[C]. In Proc. of the 30th VLDB conference, Toronto, Canada, 2004:223-235.
DOI: 10.1016/b978-012088469-8.50064-4
Google Scholar
[7]
Z. Danfeng, G.Feng, J.Shunfu, et al. A cryptograph index technology based on wrong hit expectation[J]. Journal of Chinese Computer Systems.2010, 31(1):113-118.
Google Scholar
[8]
R Agrawal, J. Kiernan, R. Srikant, et al. Order Preserving Encryption for Numeric Data. In Proc. of the ACM SIGMOD Conference On Management of Data, Paris, France, 2004:563-574.
DOI: 10.1145/1007568.1007632
Google Scholar
[9]
TPC-H. Benchmark Specification [OP]. [2009-04-20]. http://www.tpc.org.
Google Scholar
[10]
D. X. Song, D. Wanger, A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000:44-55.
DOI: 10.1109/secpri.2000.848445
Google Scholar
[11]
Y. Elovici, R. Waisenberg, E. Shmueli, et al. A Structure Preserving Database Encryption Scheme. In Proc. of VLDB Workshop on Secure Data Management. Canada, 2004:28-40.
DOI: 10.1007/978-3-540-30073-1_3
Google Scholar
[12]
E. Mykletun, M. Narasimha, G. Tsudik. Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2006, 2(2):107-138.
DOI: 10.1145/1149976.1149977
Google Scholar