Category: Prototypes

Minimum Exposure

The Minimum Exposure is a collaboration started in 2011 between several research teams (INRIA-Rocquencourt, University of Versailles St-Quentin, Ecole Polytechnique, Athens University of Economics and Business) and is supported by the Conseil Général des Yvelines. It is funded by grants DIGITEO Learning Techniques for Large and Evolving Networks (LeTeVoNe), ANR Définir, Evaluer et Modéliser les …

Continue reading

GhostDB, Hiding Sensitive Data from Prying Eyes

Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying eyes of some insurance fraudster. …

Continue reading

C-SXA: Chip-Secured XML Access

Chip-Secured XML Access (C-SXA) is an XML-based access rights controller embedded in a smart card. C-SXA evaluates user’s privileges on a queried or streaming XML encrypted document and delivers the authorized subset of this document. Compared to existing methods, C-SXA supports fine grain and dynamic access control policies by separating access control issues from encryption. …

Continue reading

C-SDA: Chip-Secured Data Access

The Chip-Secured Data Access (C-SDA) architecture allows querying encrypted data while controlling fine grain and dynamic personal privileges. The application domain of C-SDA covers the protection of databases hosted by untrusted Database Service Providers as well as the protection of database servers against external and internal piracy. The CNRS (Centre National de la Recherche Scientifique) …

Continue reading

PicoDBMS: A Secured DBMS in a Smartcard

PicoDBMS is a full-fledged DBMS (storage, indexation, query processing, access rights and transaction control) embedded in a smart card. The application domain of PicoDBMS is the management of shared secured portable folders (medical folder, user profile, agenda, etc.). Its indexation and query engines implement new strategies required to cope with the smart card hardware constraints. …

Continue reading