Остановите войну!
for scientists:
default search action
Ravishankar Ramamurthy
Publications
- 2021
- [c32]Arvind Arasu, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy:
Integrity-based Attacks for Encrypted Databases and Implications. CIDR 2021 - 2020
- [c30]Panagiotis Antonopoulos, Arvind Arasu, Kunal D. Singh, Ken Eguro, Nitish Gupta, Rajat Jain, Raghav Kaushik, Hanuma Kodavalla, Donald Kossmann, Nikolas Ogg, Ravi Ramamurthy, Jakub Szymaszek, Jeffrey Trimmer, Kapil Vaswani, Ramarathnam Venkatesan, Mike Zwilling:
Azure SQL Database Always Encrypted. SIGMOD Conference 2020: 1511-1525 - 2019
- [c29]Johannes Gehrke, Lindsay Allen, Panagiotis Antonopoulos, Arvind Arasu, Joachim Hammer, James Hunter, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Srinath T. V. Setty, Jakub Szymaszek, Alexander van Renen, Jonathan Lee, Ramarathnam Venkatesan:
Veritas: Shared Verifiable Databases and Tables in the Cloud. CIDR 2019 - 2018
- [i2]Panagiotis Antonopoulos, Arvind Arasu, Ken Eguro, Joachim Hammer, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Jakub Szymaszek:
Pushing the Limits of Encrypted Databases with Secure Hardware. CoRR abs/1809.02631 (2018) - 2017
- [c26]Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Pingfan Meng, Vineet Pandey, Ravi Ramamurthy:
Concerto: A High Concurrency Key-Value Store with Integrity. SIGMOD Conference 2017: 251-266 - 2015
- [c25]Abhijeet Mohapatra, Ravi Ramamurthy, Raghav Kaushik:
Raising Authorization Awareness in a DBMS. CIDR 2015 - [c24]Arvind Arasu, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy:
Transaction processing on confidential data using cipherbase. ICDE 2015: 435-446 - 2014
- [c23]Arvind Arasu, Ken Eguro, Raghav Kaushik, Ravishankar Ramamurthy:
Querying encrypted data. SIGMOD Conference 2014: 1259-1261 - 2013
- [j9]Yupeng Fu, Raghav Kaushik, Ravishankar Ramamurthy:
On Scaling Up Sensitive Data Auditing. Proc. VLDB Endow. 6(5): 313-324 (2013) - [c22]Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Ramarathnam Venkatesan:
Orthogonal Security with Cipherbase. CIDR 2013 - [c21]Prasang Upadhyaya, Nick R. Anderson, Magdalena Balazinska, Bill Howe, Raghav Kaushik, Ravishankar Ramamurthy, Dan Suciu:
Stop That Query! The Need for Managing Data Use. CIDR 2013 - [c20]Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan:
A secure coprocessor for database applications. FPL 2013: 1-8 - [c19]Daniel Fabbri, Ravishankar Ramamurthy, Raghav Kaushik:
SELECT triggers for data auditing. ICDE 2013: 1141-1152 - [c18]Arvind Arasu, Ken Eguro, Raghav Kaushik, Ravi Ramamurthy:
Querying encrypted data. ICDE 2013: 1262-1263 - [c17]Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Prasang Upadhyaya, Ramarathnam Venkatesan:
Secure database-as-a-service with Cipherbase. SIGMOD Conference 2013: 1033-1036 - [c16]Prasang Upadhyaya, Nick R. Anderson, Magdalena Balazinska, Bill Howe, Raghav Kaushik, Ravishankar Ramamurthy, Dan Suciu:
The power of data use management in action. SIGMOD Conference 2013: 1117-1120 - 2012
- [j8]Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Prasang Upadhyaya, Ramarathnam Venkatesan:
Engineering Security and Performance with Cipherbase. IEEE Data Eng. Bull. 35(4): 65-72 (2012) - 2011
- [j6]Raghav Kaushik, Ravishankar Ramamurthy:
Whodunit: An Auditing Tool for Detecting Data Breaches. Proc. VLDB Endow. 4(12): 1410-1413 (2011) - [c15]Surajit Chaudhuri, Raghav Kaushik, Ravishankar Ramamurthy:
Database Access Control and Privacy: Is there a common ground? CIDR 2011: 96-103 - [c14]Raghav Kaushik, Ravishankar Ramamurthy:
Efficient auditing for complex SQL queries. SIGMOD Conference 2011: 697-708 - 2010
- [c13]Stratos Idreos, Raghav Kaushik, Vivek R. Narasayya, Ravishankar Ramamurthy:
Estimating the compression fraction of an index using sampling. ICDE 2010: 441-444 - 2007
- [c7]Surajit Chaudhuri, Raghav Kaushik, Ravishankar Ramamurthy, Abhijit Pol:
Stop-and-Restart Style Execution for Long Running Decision Support Queries. VLDB 2007: 735-745 - 2005
- [c4]Surajit Chaudhuri, Raghav Kaushik, Ravishankar Ramamurthy:
When Can We Trust Progress Estimators for SQL Queries? SIGMOD Conference 2005: 575-586
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint