Главная
Study mode:
on
1
Intro
2
Data has tremendous value
3
Data creates risk
4
Encryption
5
Cryptographically Protected Search
6
Why Systematize
7
Leakage
8
Example Data
9
Differential Privacy
10
Utility
11
Database instrumentation
12
Functionality
13
Questions
Description:
Explore the intricacies of cryptographically protected database search systems in this IEEE Symposium on Security & Privacy conference talk. Delve into the challenges of balancing security, functionality, performance, and usability in protected search systems. Examine the evolution of databases and the need for adaptable protection methods. Discover key contributions, including the identification of important primitive operations across database paradigms, evaluation of current protected search systems, analysis of potential attacks, and a roadmap for transforming protected search into protected databases. Gain insights into topics such as data value, encryption, leakage, differential privacy, and database instrumentation. Learn about the speaker's approach to systematizing knowledge in this rapidly growing field and understand the importance of accurately characterizing tradeoffs between different approaches.

Cryptographically Protected Database Search

IEEE
Add to list
0:00 / 0:00