-
1
-
-
84948972435
-
-
S. Abiteboul, Querying semi-structured data, in: ICDT, 1997, pp. 1-18.
-
-
-
-
2
-
-
0041783510
-
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, 2000, pp. 439-450.
-
-
-
-
3
-
-
0031209934
-
Clearing the way for physicians' use of clinical information systems
-
Anderson J.G. Clearing the way for physicians' use of clinical information systems. Commun. ACM 40 8 (1997) 83-90
-
(1997)
Commun. ACM
, vol.40
, Issue.8
, pp. 83-90
-
-
Anderson, J.G.1
-
4
-
-
33747781566
-
-
D.E. Bell, L.J. LaPadula, Secure computer systems: Mathematical foundation and model, Technical Report, Mitre Corp. Report No. M74-244, Bedford, Mass., 1975.
-
-
-
-
5
-
-
33747804795
-
-
S. Benferhat, F. Autrel, F. Cuppens, A possibilistic logic encoding of access control, in: FLAIRS Conf., 2003, pp. 481-485.
-
-
-
-
6
-
-
0242625192
-
-
S. Benferhat, R.E. Baida, F. Cuppens, A stratification-based approach for handling conflicts in access control, in: SACMAT, 2003, pp. 189-195.
-
-
-
-
7
-
-
84989880098
-
-
E. Bertino, S. Castano, E. Ferrari, M. Mesiti, Controlled access and dissemination of XML documents, in: Workshop on Web Information and Data Management, 1999, pp. 22-27.
-
-
-
-
9
-
-
0024868341
-
-
J. Biskup, H.H. Bruggemann, The personal model of data - towards a privacy oriented information system (extended abstract), in: Proceedings of the Fifth International Conference of Data Engineering, February 6-10, 1989, Los Angeles, California, USA, IEEE Computer Society, 1989, pp. 348-355.
-
-
-
-
10
-
-
0029686313
-
National health information privacy bill generates heat at SCAMC
-
Braithwaite B. National health information privacy bill generates heat at SCAMC. J. Amer. Informat. Assoc. 3 1 (1996) 95-96
-
(1996)
J. Amer. Informat. Assoc.
, vol.3
, Issue.1
, pp. 95-96
-
-
Braithwaite, B.1
-
11
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosure
-
Brodsky A., Farkas C., and Jajodia S. Secure databases: Constraints, inference channels, and monitoring disclosure. IEEE Trans. Knowledge Data Eng. 12 6 (2000) 900-919
-
(2000)
IEEE Trans. Knowledge Data Eng.
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
12
-
-
0007938807
-
Database inference controller
-
Spooner D.L., and Landwehr C. (Eds), North-Holland, Amsterdam
-
Buczkowski L.J. Database inference controller. In: Spooner D.L., and Landwehr C. (Eds). Database Security III: Status and Prospects (1990), North-Holland, Amsterdam 311-322
-
(1990)
Database Security III: Status and Prospects
, pp. 311-322
-
-
Buczkowski, L.J.1
-
13
-
-
0030156981
-
-
P. Buneman, S. Davidson, G. Hillebrand, D. Suciu, A query language and optimization techniques for unstructured data, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 1996, pp. 505-516.
-
-
-
-
14
-
-
0040748335
-
Constraints for semi-structured data and XML
-
Buneman P., Fan W., Simeon J., and Weinstein S. Constraints for semi-structured data and XML. SIGMOD Record 30 1 (2001) 47-54
-
(2001)
SIGMOD Record
, vol.30
, Issue.1
, pp. 47-54
-
-
Buneman, P.1
Fan, W.2
Simeon, J.3
Weinstein, S.4
-
16
-
-
0034294211
-
Path constraints in semistructured databases
-
Buneman P., Fan W., and Weinstein S. Path constraints in semistructured databases. J. Comput. System Sci. 61 2 (2000) 146-193
-
(2000)
J. Comput. System Sci.
, vol.61
, Issue.2
, pp. 146-193
-
-
Buneman, P.1
Fan, W.2
Weinstein, S.3
-
17
-
-
9544223206
-
A web-based spatial data access system using semantic r-trees
-
Chen S., Wang X., Rishe N., and Weiss M.A. A web-based spatial data access system using semantic r-trees. Informat. Sci. 167 (2004) 41-61
-
(2004)
Informat. Sci.
, vol.167
, pp. 41-61
-
-
Chen, S.1
Wang, X.2
Rishe, N.3
Weiss, M.A.4
-
18
-
-
0017943805
-
Security in statistical databases for queries with small counts
-
Chin F.Y. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3 1 (1978) 92-104
-
(1978)
ACM Trans. Database Syst.
, vol.3
, Issue.1
, pp. 92-104
-
-
Chin, F.Y.1
-
19
-
-
0030658435
-
-
L. Cholvy, F. Cuppens, C. Saurel, Towards a logical formalization of responsibility, in: ICAIL, 1997, pp. 233-242.
-
-
-
-
20
-
-
33747750700
-
-
C. Clifton, M. Kantarcioglu, J. Vaidya, Defining privacy for data mining, in: Proceedings of the National Science Foundation Workshop on Next Generation Data Mining, Baltimore, MD, 2002, pp. 126-133.
-
-
-
-
21
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C., Kantarcioglu M., Vaidya J., Lin X., and Zhu M.Y. Tools for privacy preserving distributed data mining. SIGKDD Explorat. 4 2 (2002) 28-34
-
(2002)
SIGKDD Explorat.
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
22
-
-
33747795754
-
-
National Research Council, For the record: Protecting electronic health information, Technical Report, National Academy of Sciences, 1997.
-
-
-
-
23
-
-
33747796789
-
-
F. Cuppens, R. Demolomba, A deontic logic for reasoning about confidentiality, in: Proceedings of 3rd International Workshop on Deontic Logic in Computer Science, 1996.
-
-
-
-
24
-
-
84947730526
-
-
F. Cuppens, R. Demolomba, A modal logical framework for security policies, in: ISMIS, 1997, pp. 579-589.
-
-
-
-
25
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
Damiani E., De Capitani di Vimercati S., Paraboschi S., and Samarati P. Design and implementation of an access control processor for XML documents. WWW9 Comput. Networks 33 1-6 (2000) 59-75
-
(2000)
WWW9 Comput. Networks
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
26
-
-
0032690110
-
-
S. Dawson, S. De Capitani di Vimercati, P. Samarati, Minimal data upgrating to prevent inference and association attacks, in: Proceedings of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 1999, pp. 114-125.
-
-
-
-
27
-
-
0032657567
-
-
S. Dawson, S. De Capitani di Vimercati, P. Samarati, Specification and enforcement of classification and inference constraints, in: Proceedings of IEEE Symposium on Security and Privacy, 1999.
-
-
-
-
29
-
-
84937407052
-
-
D.E. Denning, Commutative filters for reducing inference threats in multilevel database systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1985, pp. 134-146.
-
-
-
-
31
-
-
0018998235
-
A fast procedure for finding a tracker in a statistical database
-
Dennning D.E., and Schlorer J. A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5 1 (1980) 88-102
-
(1980)
ACM Trans. Database Syst.
, vol.5
, Issue.1
, pp. 88-102
-
-
Dennning, D.E.1
Schlorer, J.2
-
33
-
-
33747806416
-
-
L.C.J. Dreyer, M.S. Olivier, Dynamic aspect of the infopriv model, in: Proceedings of 9th Database and Expert Systems Applications DEXA 98, IEEE Computer Society, Los Alamitos, 1998, pp. 340-345.
-
-
-
-
34
-
-
0021177508
-
-
J.A. Goguen, J. Meseguer, Unwinding and inference control, in: Proceedings of IEEE Symposium on Security and Privacy, 1984, pp. 75-86.
-
-
-
-
35
-
-
0023861339
-
-
T.H. Hinke, Inference aggregation detection in database management systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1988, pp. 96-106.
-
-
-
-
36
-
-
84945313583
-
Quantifying privacy leakage through answering database queries
-
Proceedings of 5th Information Security Conference (ISC), Springer-Verlag
-
Hsu T.S., Liau C.J., Wang D.W., and Chen J.K. Quantifying privacy leakage through answering database queries. Proceedings of 5th Information Security Conference (ISC). LNCS 2433 (2002), Springer-Verlag 162-175
-
(2002)
LNCS
, vol.2433
, pp. 162-175
-
-
Hsu, T.S.1
Liau, C.J.2
Wang, D.W.3
Chen, J.K.4
-
37
-
-
84947296768
-
A logical model for privacy protection
-
Proceedings of 4th Information Security Conference (ISC), Springer-Verlag
-
Hsu T.S., Liau C.J., and Wang D.W. A logical model for privacy protection. Proceedings of 4th Information Security Conference (ISC). LNCS 2200 (2001), Springer-Verlag 110-124
-
(2001)
LNCS
, vol.2200
, pp. 110-124
-
-
Hsu, T.S.1
Liau, C.J.2
Wang, D.W.3
-
38
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
Abrams M.D., Jajodia S., and Podell H. (Eds), IEEE Computer Society Press, Los Alamitos, Calif.
-
Jajodia S., and Meadows C. Inference problems in multilevel secure database management systems. In: Abrams M.D., Jajodia S., and Podell H. (Eds). Information Security: An Integrated Collection of Essays (1995), IEEE Computer Society Press, Los Alamitos, Calif. 570-584
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
39
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia S., Samarati P., Sapino M.L., and Subrahmanian V.S. Flexible support for multiple access control policies. ACM Trans. Database Syst. 26 2 (2001) 214-260
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
40
-
-
1842510810
-
A model of statistical databases and their security
-
Kam J.B., and Ullman J. A model of statistical databases and their security. ACM Trans. Database Syst. 2 1 (1977) 1-10
-
(1977)
ACM Trans. Database Syst.
, vol.2
, Issue.1
, pp. 1-10
-
-
Kam, J.B.1
Ullman, J.2
-
41
-
-
0034450091
-
-
M. Kudo, S. Hada, XML document security based on provisional authorization, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000.
-
-
-
-
43
-
-
0030084794
-
Inference in MLS database systems
-
Marks D.G. Inference in MLS database systems. IEEE Trans. Knowledge Data Eng. 8 1 (1996) 46-55
-
(1996)
IEEE Trans. Knowledge Data Eng.
, vol.8
, Issue.1
, pp. 46-55
-
-
Marks, D.G.1
-
44
-
-
85119629832
-
-
S. Mazumdar, D. Stemple, T. Sheard, Resolving the tension between integrity and security using a theorem prover, in: Proceedings of ACM International Conference on Management of Data, 1988, pp. 233-242.
-
-
-
-
45
-
-
0346789280
-
Lore: A database management system for semistructured data
-
McHugh J., Abiteboul S., Goldman R., Quass D., and Widom J. Lore: A database management system for semistructured data. SIGMOD Rec. 26 3 (1997) 54-66
-
(1997)
SIGMOD Rec.
, vol.26
, Issue.3
, pp. 54-66
-
-
McHugh, J.1
Abiteboul, S.2
Goldman, R.3
Quass, D.4
Widom, J.5
-
46
-
-
0025135715
-
-
C. Meadows, Extending the Brewer-Nash model to a multilevel context, in: Proceedings of IEEE Symposium on Security and Privacy, 1990, pp. 95-102.
-
-
-
-
47
-
-
33747793825
-
Privacy lost, anytime, anywhere
-
Meeks B.N. Privacy lost, anytime, anywhere. Communications of ACM 40/8 (1997) 11-13
-
(1997)
Communications of ACM
, vol.40-8
, pp. 11-13
-
-
Meeks, B.N.1
-
48
-
-
0023830194
-
-
M. Morgenstern, Controlling logical inference in multilevel database systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1988, pp. 245-255.
-
-
-
-
49
-
-
33747765682
-
-
Department of Justice, Genetic information and the workplace, Technical Report, Department of Labor, Department of Health and Human Services, Equal Employment Opportunity Commission Department of Justice, 1998.
-
-
-
-
50
-
-
33747797142
-
-
United States General Accounting Office, Medical records privacy, access needed for health research, but oversight of privacy protections is limited, Technical Report, United States General Accounting Office, Report to Congressional Requesters GAO/HEHS-99-55, 1999.
-
-
-
-
51
-
-
1542412446
-
Some privacy issues in knowledge discovery: Oecd personal privacy guidelines
-
O'Leary D.E. Some privacy issues in knowledge discovery: Oecd personal privacy guidelines. IEEE Expert/Intell. Syst. Appl. 10 2 (1995)
-
(1995)
IEEE Expert/Intell. Syst. Appl.
, vol.10
, Issue.2
-
-
O'Leary, D.E.1
-
52
-
-
33747758852
-
-
S.R.M. Oliveira, O.R. Zaiane, Privacy preserving clustering by data transformation, in: Proceedings of the 18th Brazilian Symposium on Databases, Brazil, 2003, pp. 304-318.
-
-
-
-
53
-
-
7444225924
-
-
S.R.M. Oliveira, O.R. Zaiane, Y. Saygin, Secure association rule mining, in: Proceedings of the 8th Pacific-Asian Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004, pp. 74-85.
-
-
-
-
54
-
-
0002779304
-
Privacy, information technology, and health care
-
Rindfleisch T.C. Privacy, information technology, and health care. Commun. ACM 40 8 (1997) 93-100
-
(1997)
Commun. ACM
, vol.40
, Issue.8
, pp. 93-100
-
-
Rindfleisch, T.C.1
-
55
-
-
0037391445
-
Human exploration and development of space: using xml database space wide web: Space wide web by adapters in distributed systems configuration from reusable components
-
Rine D. Human exploration and development of space: using xml database space wide web: Space wide web by adapters in distributed systems configuration from reusable components. Informat. Sci. 150 (2003) 123-151
-
(2003)
Informat. Sci.
, vol.150
, pp. 123-151
-
-
Rine, D.1
-
57
-
-
0033652039
-
-
R. Sandhu, D. Ferraiolo, R. Kuhn, The NISI model for role-based access control: Towards a unified standard, in: ACM RBAC 2000, 2000, pp. 47-64.
-
-
-
-
58
-
-
0030086382
-
Access control: Principles and practices
-
Sandhu R., and Samarati P. Access control: Principles and practices. IEEE Commun. 29 2 (1996) 38-47
-
(1996)
IEEE Commun.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Samarati, P.2
-
60
-
-
0025152631
-
-
G.W. Smith, Modeling security-relevant data semantics, in: Proceedings of IEEE Symposium on Research in Security and Privacy, 1990, pp. 384-391.
-
-
-
-
61
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
Stachour P.D., and Thuraisingham B. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge Data Eng. 2 2 (1990) 190-209
-
(1990)
IEEE Trans. Knowledge Data Eng.
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.D.1
Thuraisingham, B.2
-
64
-
-
33747782263
-
-
H. Subramaniam, Z. Yang, Report on DIMACS working group on privacy/confidentiality of health data, Technical Report, DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ, 2003.
-
-
-
-
65
-
-
33747750350
-
-
D. Suciu, Semistructured data and XML, in: Handbook of Massive Data Sets, 2002, pp. 743-788.
-
-
-
-
66
-
-
84974776829
-
A fast algorithm for detecting second paths in database inference analysis
-
Hinke T.H., Delugach H.S., and Chandrasekhar A. A fast algorithm for detecting second paths in database inference analysis. J. Comput. Security 3 2-3 (1995) 147-168
-
(1995)
J. Comput. Security
, vol.3
, Issue.2-3
, pp. 147-168
-
-
Hinke, T.H.1
Delugach, H.S.2
Chandrasekhar, A.3
-
67
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham B.M. Security checking in relational database management systems augmented with inference engines. Comput. Security 6 (1987) 479-492
-
(1987)
Comput. Security
, vol.6
, pp. 479-492
-
-
Thuraisingham, B.M.1
-
69
-
-
2342616187
-
Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model
-
Tsumoto S. Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model. Informat. Sci. 162 (2004) 65-80
-
(2004)
Informat. Sci.
, vol.162
, pp. 65-80
-
-
Tsumoto, S.1
-
74
-
-
0002851150
-
Web implementation of a security mediator for medical databases
-
Lin T.Y., and Qian S. (Eds), Chapman and Hall
-
Wiederhold G., Bilello M., and Donahue C. Web implementation of a security mediator for medical databases. In: Lin T.Y., and Qian S. (Eds). Database Security XI Status and Prospent (1998), Chapman and Hall 60-67
-
(1998)
Database Security XI Status and Prospent
, pp. 60-67
-
-
Wiederhold, G.1
Bilello, M.2
Donahue, C.3
-
75
-
-
33747781909
-
-
G. Wiederhold, M. Bilello, V. Sarathy, X.L. Qian, Protecting collaboration, in: Proceedings of the NISSC 1996 National Information Systems Security Conference, 1996, pp. 561-569.
-
-
-
-
76
-
-
0030347009
-
-
G. Wiederhold, M. Bilello, V. Sarathy, X.L. Qian, A security mediator for health care information, in: Proceedings of the 1996 AMIA Conference, 1996, pp. 120-124.
-
-
-
-
77
-
-
10844289527
-
Xml application schema matching using similarity measure and relaxation labeling
-
Yi S., Huang B., and Chan W.T. Xml application schema matching using similarity measure and relaxation labeling. Informat. Sci. 169 (2005) 27-46
-
(2005)
Informat. Sci.
, vol.169
, pp. 27-46
-
-
Yi, S.1
Huang, B.2
Chan, W.T.3
|