-
1
-
-
70350750399
-
Advanced SQL injection in SQL server applications
-
G. Anley. Advanced SQL injection in SQL server applications. NGSSoftware Insight Security, available from www.ngssoftware.com, 2002.
-
(2002)
NGSSoftware Insight Security
-
-
Anley, G.1
-
2
-
-
0242540374
-
An infrastructure for managing secure update operations on xml data
-
ACM Press
-
E. Bertino, G. Mella, G. Correndo, and E. Ferrari. An infrastructure for managing secure update operations on xml data. In Symposium on Access control models and technologies, pages 110-122. ACM Press, 2003.
-
(2003)
Symposium on Access Control Models and Technologies
, pp. 110-122
-
-
Bertino, E.1
Mella, G.2
Correndo, G.3
Ferrari, E.4
-
3
-
-
0035748036
-
Flexible authentication of XML documents
-
ACM Press
-
P. Devanbu, M. Gertz, A. Kwong, G. Martel, G. Nuckolls, and S. G. Stubblebine. Flexible authentication of XML documents. In Proceedings of the 8th ACM conference, on Computer and Communications Security, pages 136-145. ACM Press, 2001.
-
(2001)
Proceedings of the 8th ACM Conference, on Computer and Communications Security
, pp. 136-145
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, G.4
Nuckolls, G.5
Stubblebine, S.G.6
-
4
-
-
0038274733
-
Authentic data publication over the internet
-
P. Devanbu, M. Gertz, G. Martel, and S. G. Stubblebine. Authentic data publication over the internet. J. of Computer Security, 11(3):291-314, 2003.
-
(2003)
J. of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, G.3
Stubblebine, S.G.4
-
5
-
-
33749382489
-
Authentic third-party data publication
-
P. T. Devanbu, M. Gertz, G. Martel, and S. G. Stubblebine. Authentic third-party data publication. In IFIP Work, on Database Security, 2000.
-
(2000)
IFIP Work, on Database Security
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, G.3
Stubblebine, S.G.4
-
6
-
-
0004634724
-
Dynamic data structures for orthogonal intersection queries
-
Technical University of Graz, Austria
-
H. Edelsbrunner. Dynamic data structures for orthogonal intersection queries. Technical report, Technical University of Graz, Austria, 1980.
-
(1980)
Technical Report
-
-
Edelsbrunner, H.1
-
7
-
-
33744929815
-
-
Federal Information Processing Standard Publication 180-2
-
Secure hash standard (SHA). Federal Information Processing Standard Publication 180-2, 2000.
-
(2000)
Secure Hash Standard (SHA)
-
-
-
9
-
-
84958063551
-
On certificate revocation and validation
-
P. C. Kocher. On certificate revocation and validation. In Fin. Cryptography, pages 172-177, 1998.
-
(1998)
Fin. Cryptography
, pp. 172-177
-
-
Kocher, P.C.1
-
10
-
-
33745604825
-
Managing intervals efficiently in object-relational databases
-
H.-P. Kriegel, M. Potke, and T. Seidl. Managing intervals efficiently in object-relational databases. In VLDB Conference, pages 407-418, 2000.
-
(2000)
VLDB Conference
, pp. 407-418
-
-
Kriegel, H.-P.1
Potke, M.2
Seidl, T.3
-
11
-
-
0003455038
-
-
PhD thesis, Information Systems Laboratory, Stanford University
-
R. G. Merkle. Secrecy, authentication, and public key systems. PhD thesis, Information Systems Laboratory, Stanford University, 1979.
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.G.1
-
13
-
-
84969346266
-
A certified digital signature
-
R. G. Merkle. A certified digital signature. In CRYPTO, pages 218-238, 1989.
-
(1989)
CRYPTO
, pp. 218-238
-
-
Merkle, R.G.1
-
15
-
-
33744910535
-
Managing integrity for data exchanged on the web
-
A. Doan, F. Neven, R. McCann, and G. J. Bex, editors
-
G. Miklau and D. Suciu. Managing integrity for data exchanged on the web. In A. Doan, F. Neven, R. McCann, and G. J. Bex, editors, WebDB, pages 13-18, 2005.
-
(2005)
WebDB
, pp. 13-18
-
-
Miklau, G.1
Suciu, D.2
-
16
-
-
85084162561
-
Certificate revocation and certificate update
-
M. Naor and K. Nissim. Certificate revocation and certificate update. In USENIX Security Symp., 1998.
-
(1998)
USENIX Security Symp.
-
-
Naor, M.1
Nissim, K.2
-
19
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying completeness of relational query results in data publishing. In SIGMOD Conference, pages 407-418, 2005.
-
(2005)
SIGMOD Conference
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
20
-
-
2442590644
-
Authenticating query results in edge computing
-
H. Pang and K.-L. Tan. Authenticating query results in edge computing. In ICDE, 2004.
-
(2004)
ICDE
-
-
Pang, H.1
Tan, K.-L.2
-
23
-
-
84858889061
-
SQL injection: Are your web applications vulnerable?
-
Retrieved Oct 1, 2004
-
SQL injection: Are your web applications vulnerable? SPI Dynamics Inc. White Paper, Retrieved Oct 1, 2004 from: www.spidynamics.com, 2002.
-
(2002)
SPI Dynamics Inc. White Paper
-
-
|