• Publications
  • Influence
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in database outsourcingExpand
  • 484
  • 35
  • PDF
Secure multidimensional range queries over outsourced data
In this paper, we study the problem of supporting multidimensional range queries on encrypted data. The problem is motivated by secure data outsourcing applications where a client may store his/herExpand
  • 207
  • 24
  • PDF
Processing Spatial-Keyword (SK) Queries in Geographic Information Retrieval (GIR) Systems
Location-based information contained in publicly available GIS databases is invaluable for many applications such as disaster response, national infrastructure protection, crime analysis, andExpand
  • 250
  • 19
  • PDF
CREW: A Gossip-based Flash-Dissemination System
In this paper, we explore a new form of dissemination called Flash Dissemination that involves dissemination of fixed, rich information to a large number of recipients in as short a time as possible.Expand
  • 58
  • 7
  • PDF
Search on Encrypted Data
The proliferation of a new breed of data management applications that store and process data at remote locations has led to the emergence of search over encrypted data as an important researchExpand
  • 37
  • 4
  • PDF
CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats
In this paper, we propose a content-based publish/subscribe (pub/sub) framework that delivers matching content to subscribers in their desired format. Such a framework enables the pub/sub system toExpand
  • 9
  • 2
  • PDF
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of published data forExpand
  • 29
  • 1
  • PDF
CloudProtect: Managing Data Privacy in Cloud Applications
This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext forExpand
  • 19
  • 1
  • PDF
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information does not violate users' privacy.Expand
  • 22
  • 1
  • PDF
Indexing text data under space constraints
An important class of queries is the LIKE predicate in SQL. In the absence of an index, LIKE queries are subject to performance degradation. The notion of indexing on substrings (or <i>q</i>-grams)Expand
  • 12
  • 1
  • PDF