Back to Results
First PageMeta Content
Database management systems / Relational database management systems / Data modeling / SQL keywords / Cross-platform software / Database / SQL / Column / Proxy server / Data management / Computing / Data


CryptDB: Protecting Confidentiality with Encrypted Query Processing Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL A BSTRACT
Add to Reading List

Document Date: 2014-09-26 19:20:39


Open Document

File Size: 391,42 KB

Share Result on Facebook

City

Cascais / adjustable query / /

Company

Ge / CBC / MySQL / CryptDB / Postgres / Intel / the AES / /

Country

Portugal / /

Currency

pence / USD / /

Event

FDA Phase / /

IndustryTerm

encrypted query processing / malicious server / cross-site / web applications / application server / query processing / binary search trees / web forum application / Online applications / overall search scheme / theoretical solutions / word search / keyword search / database-backed web sites / software compromises / application developer / schema developer / change to their applications / database server / na¨ıve solution / database management systems / public cloud computing infrastructures / software bugs / phpBB web forum application / proxy server / important applications / software vulnerabilities / computing / conference management software / cryptographic protocol / test applications / /

Organization

Database Administration / DBAs / RND UDF / MIT / PC / /

Person

Hari Balakrishnan / Catherine M. S. Redfield / Ada Popa / ASE S TUDIES / /

Position

database administrator / curious database administrator / IND-CPA / administrator / chair / Private / programmer / /

Product

SQL injection / CCA2 / Song / CCA2secure / /

ProgrammingLanguage

K / SQL / /

Technology

corresponding onion encryption / OPE encryption / RAM / possible encryptions / Eq onion encryption / symmetric-key encryption / 3.1 SQL-aware Encryption / cryptographic protocol / block cipher / private key / secret key / using SQL-aware encryption / DBMS / equality Adjustable Query-based Encryption / access control list / encryption / cryptography / increasingly stronger encryption / public key / proxy server / adjustable query-based encryption / caching / Order-preserving encryption / batch encryption / 2.8 GHz Q9550 processor / /

SocialTag