[1] |
Ji S, Pan S, Cambria E, et al. A survey on knowledge graphs:Representation,acquisition,and applications[J].IEEE Transactions on Neural Networks and Learning Systems,2022,33(2):494-514.
|
[2] |
Yang Y,Huang X,Liu X,et al.A comprehensive survey on secure outsourced computation and its applications[J].IEEE Access,2019,7:159426-159465.
|
[3] |
Tran N P,Lee M,Hong S,et al.Parallel execution of AES-CTR algorithm using extended block size[C]∥Proc of 2011 14th IEEE International Conference on Computational Science and Engineering,2011:191-198.
|
[4] |
Ryan M D. Cloud computing security:The scientific challenge,and a survey of solutions[J].Journal of Systems and Software,2013,86(9):2263-2268.
|
[5] |
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]∥Proc of 2000 IEEE Symposium on Security and Privacy,2000:44-55.
|
[6] |
Kamara S, Papamanthou C,Roeder T.Dynamic searchable symmetric encryption[C]∥Proc of the 2012 ACM Conference on Computer and Communications Security,2012:965-976.
|
[7] |
Cash D,Jaeger J,Jarecki S,et al.Dynamic searchable encryption in very-large databases:Data structures and implementation[C]∥Proc of the Network and Distributed System Security Symposium,2014:23-26.
|
[8] |
Popa R A,Redfield C M S,Zeldovich N,et al.CryptDB:Processing queries on an encrypted database[J].Communications of the ACM,2012,55(9):103-111.
|
[9] |
Pappas V,Krell F,Vo B,et al.Blind Seer:A scalable private DBMS[C]∥Proc of 2014 IEEE Symposium on Security and Privacy,2014:359-374.
|
[10] |
Wang Xin, Zou Lei,Wang Chao-kun,et al.Research on knowledge graph data management:A survey[J]. Journal of Software,2019,30(7):2139-2174.(in Chinese)
|
[11] |
Dong S,Kryczka A,Jin Y,et al.RocksDB:Evolution of development priorities in a key-value store serving large-scale applications[J].ACM Transactions on Storage,2021,17(4):1-32.
|
[12] |
Liu Wen-xin,Gao Ying.A survey on security development of searchable symmetric encryption[J].Journal of Cyber Security,2021,6(2):73-84.(in Chinese)
|
[13] |
Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:Improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934.
|
[14] |
Lissandrini M,Mottin D,Palpanas T,et al.Graph-query suggestions for knowledge graph exploration[C]∥Proc of the Web Conference,2020:2549-2555.
|
[15] |
O’Neil P,Cheng E,Gawlick D,et al.The log-structured merge-tree (LSM-tree)[J].Acta Informatica,1996,33(4):351-385.
|
[16] |
Bellare M,Namprempre C.Authenticated encryption:Relations among notions and analysis of the generic composition paradigm[C]∥Proc of International Conference on the Theory and Application of Cryptology and Information Security,2000:531-545.
|
[17] |
Vaidehi M,Rabi B J.Design and analysis of AES-CBC mode for high security applications[C]∥Proc of the 2nd International Conference on Current Trends in Engineering and Technology,2014:499-502.
|
|
附中文参考文献:
|
[10] |
王鑫,邹磊,王朝坤,等.知识图谱数据管理研究综述[J].软件学报,2019,30(7):2139-2174.
|
[12] |
刘文心,高莹.对称可搜索加密的安全性研究进展[J].信息安全学报,2021,6(2):73-84.
|