[HTML][HTML] Informed consent in biomedical research

FK Dankar, M Gergely, SK Dankar - Computational and structural …, 2019 - Elsevier
Informed consent is the result of tumultuous events in both the clinical and research arenas
over the last 100 years. Throughout this time, the notion of informed consent has shifted …

CryptDB: Protecting confidentiality with encrypted query processing

RA Popa, CMS Redfield, N Zeldovich… - Proceedings of the …, 2011 - dl.acm.org
Online applications are vulnerable to theft of sensitive information because adversaries can
exploit software bugs to gain access to private data, and because curious or malicious …

Database management as a service: Challenges and opportunities

D Agrawal, A El Abbadi, F Emekci… - 2009 IEEE 25th …, 2009 - ieeexplore.ieee.org
Data outsourcing or database as a service is a new paradigm for data management in which
a third party service provider hosts a database as a service. The service provides data …

Inference attacks on property-preserving encrypted databases

M Naveed, S Kamara, CV Wright - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Many encrypted database (EDB) systems have been proposed in the last few years as cloud
computing has grown in popularity and data breaches have increased. The state-of-the-art …

Authorized private keyword search over encrypted data in cloud computing

M Li, S Yu, N Cao, W Lou - 2011 31st international conference …, 2011 - ieeexplore.ieee.org
In cloud computing, clients usually outsource their data to the cloud storage servers to
reduce the management costs. While those data may contain sensitive personal information …

Private query on encrypted data in multi-user settings

F Bao, RH Deng, X Ding, Y Yang - International Conference on …, 2008 - Springer
Searchable encryption schemes allow users to perform keyword based searches on an
encrypted database. Almost all existing such schemes only consider the scenario where a …

Shared and searchable encrypted data for untrusted servers

C Dong, G Russello, N Dulay - Journal of Computer Security, 2011 - content.iospress.com
Current security mechanisms are not suitable for organisations that outsource their data
management to untrusted servers. Encrypting and decrypting sensitive data at the client side …

Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index

B Wang, Y Hou, M Li, H Wang, H Li - … of the 9th ACM symposium on …, 2014 - dl.acm.org
Cloud computing promises users massive scale outsourced data storage services with much
lower costs than traditional methods. However, privacy concerns compel sensitive data to be …

Multi-user private keyword search for cloud computing

Y Yang, H Lu, J Weng - 2011 IEEE third international …, 2011 - ieeexplore.ieee.org
Enterprises outsourcing their databases to the cloud and authorizing multiple users for
access represents a typical use scenario of cloud storage services. In such a case of …

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Y Zhu, Z Huang, T Takagi - Journal of Parallel and Distributed Computing, 2016 - Elsevier
To enjoy the advantages of cloud service while preserving security and privacy, huge data
are increasingly outsourced to cloud in encrypted form. Unfortunately, most conventional …