Author image not provided
 Florian Kerschbaum

 www.fkerschbaum.org

ACM Senior Member badge
  Affiliation history
Bibliometrics: publication history
Average citations per article5.10
Citation Count372
Publication count73
Publication years2001-2016
Available for download33
Average downloads per article341.33
Downloads (cumulative)11,264
Downloads (12 Months)1,154
Downloads (6 Weeks)206
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


73 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 73
Result page: 1 2 3 4

Sort by:

1 published by ACM
May 2018 SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 56,   Downloads (12 Months): 56,   Downloads (Overall): 57

Full text available: PDFPDF
In this paper we address the problem of outsourcing sensitive strings while still providing the functionality of substring searches. While security is one important aspect that requires careful system design, the practical application of the solution depends on feasible processing time and integration efforts into existing systems. That is, searchable ...
Keywords: encrypted databases, secure substring search

2 published by ACM
October 2016 CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 79,   Downloads (Overall): 235

Full text available: PDFPDF
The software-as-a-service (SaaS) market is growing very fast, but still many clients are concerned about the confidentiality of their data in the cloud. Motivated hackers or malicious insiders could try to steal the clients' data. Encryption is a potential solution, but supporting the necessary functionality also in existing applications is ...
Keywords: encrypted web application, homomorphic encryption, stateless proxy, encrypted database

3 published by ACM
October 2016 CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 49,   Downloads (Overall): 110

Full text available: PDFPDF
Privacy-preserving range queries allow encrypting data while still enabling queries on ciphertexts if their corresponding plaintexts fall within a requested range. This provides a data owner the possibility to outsource data collections to a cloud service provider without sacrificing privacy nor losing functionality of filtering this data. However, existing methods ...
Keywords: secure computation, searchable encryption, encrypted database

4 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 37,   Downloads (Overall): 126

Full text available: PDFPDF
The objective of the 3rd ACM Workshop on Information Sharing and Collaborative Security is to advance the scientific foundations for sharing security-related data. Improving information sharing remains an important theme in the computer security community. A number of new sharing communities have been formed. Also, so called "threat intelligence" originating ...

5 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 9,   Downloads (12 Months): 92,   Downloads (Overall): 480

Full text available: PDFPDF
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. This makes its performance and functionality very suitable for data outsourcing in cloud computing scenarios, but the security of order-preserving is still debatable. We present a scheme that achieves a strictly stronger notion of security ...
Keywords: order-preserving encryption, randomization, indistinguishability

6 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 65,   Downloads (Overall): 307

Full text available: PDFPDF
Notwithstanding the latest buzzwords (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like deployment are the fastest growing computing infrastructures today. How exactly they will look like tomorrow is still for the markets to decide, yet one thing has already been identified: clouds have new, untested deployment, associated adversarial ...
Keywords: privacy, security, cloud computing

7
September 2015 Proceedings, Part I, of the 20th European Symposium on Computer Security -- ESORICS 2015 - Volume 9326
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

Proofs-of-Retrievability enables a client to store his data on a cloud server so that he executes an efficient auditing protocol to check that the server possesses all of his data in the future. During an audit, the server must maintain full knowledge of the client's data to pass, even though ...
Keywords: Cloud storage, Proofs of retrievability, Indistinguishability obfuscation

8 published by ACM
May 2015 SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 9,   Downloads (12 Months): 66,   Downloads (Overall): 486

Full text available: PDFPDF
A data owner outsourcing the database of a multi user application wants to prevent information leaks caused by outside attackers exploiting software vulnerabilities or by curious personnel. Query processing over encrypted data solves this problem for a single user, but provides only limited functionality in the face of access restrictions ...
Keywords: encrypted query processing, multi user, encryption-based access control

9 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 18,   Downloads (12 Months): 170,   Downloads (Overall): 892

Full text available: PDFPDF
Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud storage where a client outsources its files while the (cloud) service provider should search and selectively retrieve those. Searchable encryption is an active area of research and a number of schemes with different efficiency ...
Keywords: searchable encryption, update, dynamic searchable encryption, secure index

10 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 18,   Downloads (12 Months): 94,   Downloads (Overall): 419

Full text available: PDFPDF
Order-preserving encryption enables performing many classes of queries -- including range queries -- on encrypted databases. Popa et al. recently presented an ideal-secure order-preserving encryption (or encoding) scheme, but their cost of insertions (encryption) is very high. In this paper we present an also ideal-secure, but significantly more efficient order-preserving ...
Keywords: efficiency, order-preserving encryption, in-memory column database, adjustable encryption, indistinguishability, ideal security

11 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10,   Downloads (12 Months): 50,   Downloads (Overall): 314

Full text available: PDFPDF
Customers of cloud service demand control over their data. Next to threats to intellectual property, legal requirements and risks, such as data protection compliance or the possibility of a subpoena of the cloud service provider, also pose restrictions. A commonly proposed and implemented solution is to encrypt the data on ...
Keywords: cloud, encryption, tutorial

12 published by ACM
June 2014 SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 68,   Downloads (Overall): 402

Full text available: PDFPDF
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems; and our everyday lives are invaded by sensors like smart meters and electronic tickets. The ...
Keywords: challenges, access control, panel

13
December 2013 ICISS 2013: Proceedings of the 9th International Conference on Information Systems Security - Volume 8303
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Processing encrypted queries in the cloud has been extended by CryptDB's approach of adjustable onion encryption. This adjustment of the encryption entails a translation of an SQL query to an equivalent query on encrypted data. We investigate in more detail this translation and in particular the problem of selecting the ...

14 published by ACM
November 2013 WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 9,   Downloads (12 Months): 36,   Downloads (Overall): 301

Full text available: PDFPDF
Many electronic ticketing systems for public transportation have been deployed around the world. Using the example of Singapore's EZ-Link system we show that it is easy to invade a traveller's privacy and obtain his travel records in a real-world system. Then we propose encrypted bill processing of the travel records ...
Keywords: data mining, privacy, bill processing, electronic tickets, security analysis

15 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4,   Downloads (12 Months): 12,   Downloads (Overall): 180

Full text available: PDFPDF
Recent databases are implemented as in-memory column-stores. Adjustable encryption offers a solution to encrypted database processing in the cloud. We show that the two technologies play well together by providing an analysis and prototype results that demonstrate the impact of mechanisms at the database side (dictionaries and their compression) and ...
Keywords: column store, database outsourcing, encryption, in-memory

16
July 2013 DBSec'13: Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

In order to perform a join in a deterministically, adjustably encrypted database one has to re-encrypt at least one column. The problem is to select that column that will result in the minimum number of re-encryptions even under an unknown schedule of joins. Naive strategies may perform too many or ...
Keywords: adjustable join, encrypted database, proxy re-encryption

17
July 2013 DBSec 2013: Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXVII - Volume 7964
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

In order to perform a join in a deterministically, adjustably encrypted database one has to re-encrypt at least one column. The problem is to select that column that will result in the minimum number of re-encryptions even under an unknown schedule of joins. Naive strategies may perform too many or ...
Keywords: Adjustable Join, Proxy Re-encryption, Encrypted Database

18 published by ACM
June 2013 SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 39,   Downloads (Overall): 482

Full text available: PDFPDF
Security is still a major inhibitor of cloud computing. When companies are testing cloud applications, e.g. for storage or databases, they use generated data for fear of data loss. Modern encrypted databases where the cryptographic key remains at the client provide a solution to this problem. Recent results in cryptography, ...
Keywords: database, cloud, encryption

19 published by ACM
June 2013 SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 134

Full text available: PDFPDF
Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business process. Privacy by means of controlling access to data is of the utmost importance in benchmarking. ...

20
October 2012 APF 2012: Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Private data is commonly revealed to the party performing the computation on it. This poses a problem, particularly when outsourcing storage and computation, e.g., to the cloud. In this paper we present a review of security mechanisms and a research agenda for privacy-preserving computation. We begin by reviewing current application ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us