Proceedings of the 2004 ACM SIGMOD International
Conference on Management of Data. ACM.
Agrawal, D., El Abbadi, A., Emekci, F., Metwally, A.,
2009. Database management as a service: Challenges
and opportunities. In International Conference on
Data Engineering. IEEE.
Ang, G. W., Woelfel, J. H., Woloszyn, T. P., 2012.
System and method of sort-order preserving
tokenization. US Patent Application 13/450,809.
Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann,
D., Ramamurthy, R., Venkatesan, R., 2013.
Orthogonal Security with Cipherbase. In Conference
on Innovative Data Systems Research,
www.cidrdb.org.
Bajaj, S., Sion, R., 2011. TrustedDB: A Trusted
Hardware-Based Database with Privacy and Data
Confidentiality. In SIGMOD – International
Conference on Management of Data. ACM.
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A., 2009.
Order-preserving symmetric encryption. In Inter-
national Conference on the Theory and Applications
of Cryptographic Techniques. Springer LNCS.
Boldyreva, A., Chenette, N., O’Neill, A., 2011. Order-
preserving encryption revisited: Improved security
analysis and alternative solutions. In Annual
Cryptology Conference. Springer LNCS.
Gentry, C., 2009. Fully Homomorphic Encryption Using
ideal Lattices. In STOC ’09 - ACM symposium on
Theory of computing, ACM.
Hacigümüs, H., Iyer, B., Li, C., Mehrotra, S., 2002.
Executing SQL over Encrypted Data in the Database-
Service-Provider Model. In SIGMOD – International
Conference on Management of Data. ACM.
Kadhem, H., Amagasa, T., Kitagawa, H., 2010. MV-
OPES: Multivalued-order preserving encryption
scheme: A novel scheme for encrypting integer value
to many different values. In IEICE Transactions on
Information and Systems, E93.D.
Kadhem, H., Amagasa, T., Kitagawa, H., 2010. A secure
and efficient order preserving encryption scheme for
relational databases. In International Conference on
Knowledge Management and Information Sharing,
Springer CCIS.
Lee, S., Park, T.-J., Lee, D., Nam, T., Kim, S., 2009.
Chaotic order preserving encryption for efficient and
secure queries on databases. In IEICE Transactions
on Information and Systems, E92.D.
Lehnhardt, J. Rho, T., Spalka, A. Cremers, A. B., 2014.
Ordered Range Searches on Encrypted Data. In:
Technical Report IAI-TR-2014-03, Computer Science
Department III, University of Bonn, ISSN 0944-8535.
Liu, D. Wang, S., 2012. Programmable order-preserving
secure index for encrypted database query. In
International Conference on Cloud Computing, IEEE.
Liu, D., Wang, S., 2013. Nonlinear order preserving index
for encrypted database query in service cloud
environments. In: Concurrency and Computation:
Practice and Experience, John Wiley & Sons, Ltd.
Özsoyoglu, G., Singer, D. A., Chung, S. S., 2003. Anti-
tamper databases: Querying encrypted databases. In
IFIP WG 11.3 Working Conference. on Database and
Applications Security. Springer LNCS.
Popa, R. A., Redfield, C. M. S., Zeldovich,
N., Balakrishnan, H., 2012. CryptDB: Processing
queries on an encrypted database. In Communications
of the ACM, 55(9).
Popa, R. A., Li, F. H., Zeldovich, N., 2013. An Ideal-
Security Protocol for Order-Preserving Encoding. In
Symposium on Security and Privacy, IEEE:
Tu, S., Kaashoek, M. F., Madden, S., Zeldovich, N., 2013.
Processing Analytical Queries over Encrypted Data. In
Proceedings of the VLDB Endowment, Vol. 6 Issue 5,
ACM.
Xiao, L., Yen, I.-L., Huynh, D. T., 2012. Extending order
preserving encryption for multi-user systems.
Cryptology ePrint Archive, Report 2012/192.
Xiao, L., Yen, I.-L., Huynh, D. T., 2012. A note for the
ideal order-preserving encryption object and
generalized order-preserving encryption. Cryptology
ePrint Archive, Report 2012/350, 2012.
Yum, D., Kim, D., Kim, J., Lee, P., Hong, S., 2011.
Order-preserving encryption for non-uniformly
distributed plaintexts. In: International Workshop on
Information Security Applications, Springer LNCS.
Performance-optimizedIndexesforInequalitySearchesonEncryptedDatainPractice
229