Author of the publication

Executing SQL over encrypted data in the database-service-provider model.

, , , and . SIGMOD Conference, page 216-227. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performability comparison of configurable duplex systems., , and . Comput. Syst. Sci. Eng., 3 (4): 201-215 (1988)Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model., , and . DBSec, volume 142 of IFIP, page 61-74. Kluwer/Springer, (2003)Encrypted Database Integrity in Database Service Provider Model., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 165-174. Kluwer, (2002)Efficient Execution of Aggregation Queries over Encrypted Relational Databases., , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 125-136. Springer, (2004)Data Warehousing and Why it is the In-Thing.. COMAD, Tata McGraw-Hill, (1995)Analysis of Affinity Based Routing in Multi-System Data Sharing., , , and . Perform. Evaluation, 7 (2): 87-109 (1987)Modelling of Centralized Concurrency Control in a Multi-System Environment., , , , and . SIGMETRICS, page 183-191. ACM, (1985)Hardware Assisted Sorting in IBM's DB2 DBMS.. COMAD (b), Computer Society of India, (2005)Optimal Buffer Partitioning for the Nested Block Join Algorithm., , , and . ICDE, page 510-519. IEEE Computer Society, (1991)Automated Storage Management with QoS Guarantees., , , and . ICDE, page 150. IEEE Computer Society, (2006)