-
3
-
-
84858908310
-
-
SETI Home. Online at http://setiathome.ssl.berkeley.edu.
-
-
-
-
4
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram Kenthapadi, Rajeev Motwani, Utkarsh Srivastava, Dilys Thomas, and Ying Xu. Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Second Conference on Innovative Data Systems Research, 2005.
-
(2005)
Proceedings of the Second Conference on Innovative Data Systems Research
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
5
-
-
0242674432
-
Hippocratic databases
-
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In Proceedings of the International Conference on Very Large Databases VLDB, pages 143-154, 2002.
-
(2002)
Proceedings of the International Conference on Very Large Databases VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
7
-
-
84904248949
-
Author-X: A java-based system for XML data protection
-
Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Author-X: A Java-Based System for XML Data Protection. In IFIP Workshop on Database Security, pages 15-26, 2000.
-
(2000)
IFIP Workshop on Database Security
, pp. 15-26
-
-
Bertino, E.1
Braun, M.2
Castano, S.3
Ferrari, E.4
Mesiti, M.5
-
9
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.
-
(2003)
EuroCrypt
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
11
-
-
0029541045
-
Private information retrieval
-
Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41-50, 1995.
-
(1995)
IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
12
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
ACM Press
-
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed Elmagarmid, and Dan Suciu. Privacy-preserving data integration and sharing. In The 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pages 19-26. ACM Press, 2004.
-
(2004)
The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
13
-
-
0003504808
-
Security and privacy implications of data mining
-
Montreal, Canada. Computer Sciences, University of British Columbia
-
Chris Clifton and Don Marks. Security and privacy implications of data mining. In Workshop on Data Mining and Knowledge Discovery, pages 15-19, Montreal, Canada, 1996. Computer Sciences, University of British Columbia.
-
(1996)
Workshop on Data Mining and Knowledge Discovery
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
14
-
-
77958484856
-
Authentic third-party data publication
-
Premkumar T. Devanbu, Michael Gertz, Chip Martel, and Stuart G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security, pages 101-112, 2000.
-
(2000)
IFIP Workshop on Database Security
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
17
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
ACM Press
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 216-227. ACM Press, 2002.
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
20
-
-
10944264913
-
User authentication in multidatabase systems
-
R. R. Wagner, editor, Los Alamitos, CA. IEEE Computer Society Press
-
E. Hildebrandt and G. Saake. User Authentication in Multidatabase Systems. In R. R. Wagner, editor, Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, August 26-28, 1998, Vienna, Austria, pages 281-286, Los Alamitos, CA, 1998. IEEE Computer Society Press.
-
(1998)
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, August 26-28, 1998, Vienna, Austria
, pp. 281-286
-
-
Hildebrandt, E.1
Saake, G.2
-
22
-
-
0030677524
-
A logical language for expressing authorizations
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy. Oakland, CA, pages 31-42, 1997.
-
(1997)
IEEE Symposium on Security and Privacy. Oakland, CA
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
26
-
-
0038223814
-
A general model for authenticated data structures
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authenticated data structures. Technical report, 2001.
-
(2001)
Technical Report
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
31
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM Press
-
Shariq Rizvi, Alberto Mendelzon, S. Sudarshan, and Prasan Roy. Extending query rewriting techniques for fine-grained access control. In Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 551-562. ACM Press, 2004.
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
32
-
-
19944433808
-
The pudding of trust
-
Staab S., Bhargava B., Lilien L., Rosenthal A., Winslett M., Sloman M., Dillon T.S., Chang E., Hussain F.K., Nejdl W., Olmedilla D., and Kashyap V. The pudding of trust. IEEE Intelligent Systems, 19(5):74-88, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
Dillon, T.S.7
Chang, E.8
Hussain, F.K.9
Nejdl, W.10
Olmedilla, D.11
Kashyap, V.12
|