Back to Results
First PageMeta Content
PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem


Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL
Add to Reading List

Open Document

File Size: 376,62 KB

Share Result on Facebook

City

Trento / /

Company

AES / LocalDecrypt / SSB / Ge / LocalProjection / Zdonik / NTL / CBC / RemoteSQL SELECT GROUP / ra Co / Intel / M ONOMI / JOIN / /

Country

Italy / /

Currency

USD / /

Facility

M ONOMI ODBC library / Execution-Greedy bar / /

IndustryTerm

encrypted query processing / final query processing / naïve algorithm / query processing / client/server / distinct groups / client-side query processing / untrusted database server / decryption operators / minimum cost solution / application developer / secure processors / database server / backend database server / plaintext query processing / possible solution / outsource query processing / encrypted data processing / materialized view selection tools / adversarial server / keyword search query / computing / post-processing time / /

OperatingSystem

Linux / /

Organization

MIT / VLDB Endowment / /

Person

Riva del Garda / Samuel Madden / M ONOMI / Stephen Tu / /

Position

designer and planner / optimizing designer and planner / +Planner / designer / and planner / optimizing planner / designer and a planner / query workload Client application Monomi designer / physical database designer / designer / encrypted data Monomi library Monomi planner / administrator / representative / query planner / planner / optimizing designer / None None SQL query Results Client ODBC driver / /

Product

Paillier / Postgres / /

ProgrammingLanguage

SQL / L / OCAL / C++ / /

Technology

OPE encryption / LAN / RAM / TPM chips / Xeon E5520 processors / Linux / Paillier encryption / 2 Encryption / block cipher / homomorphic encryption / client using Algorithm / DBMS / Blowfish algorithm / RAID / encryption / pruning heuristics The algorithm / cryptography / public key / deterministic encryption / naïve algorithm / 6.5 With constraints The designer algorithm / caching / Xeon E5530 processors / order-preserving encryption / client/server / /

SocialTag