Abstract. Mobile devices are capable of retrieving and processing data from remote databases. In a wireless data transmission environment, users are typically charged by the size o...
Eric Lo, Nikos Mamoulis, David Wai-Lok Cheung, Wai...
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Location-aware mobile users need to access, query, and visualize, geographic information in a wide variety of applications including tourism, navigation, environmental management,...
Suresh K. Lodha, Nikolai M. Faaland, Grant Wong, A...