-
2
-
-
33846314960
-
-
R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In Proceedings of the 30th international conference on Very Large Data Bases (VIDE), pages 516-527, 2004.
-
R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In Proceedings of the 30th international conference on Very Large Data Bases (VIDE), pages 516-527, 2004.
-
-
-
-
3
-
-
0242674432
-
Hippocratic databases
-
Morgan-Kaufmann
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th international conference on Very Large Data Bases (VLDB), pages 143-154. Morgan-Kaufmann, 2002.
-
(2002)
Proceedings of the 28th international conference on Very Large Data Bases (VLDB)
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical Report 99-15, Chalmers Univ, Mar
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers Univ., Mar. 2000.
-
(2000)
-
-
Axelsson, S.1
-
7
-
-
0031269184
-
On the optimality of the simple bayesian classifier under zero-one loss
-
P. Domingos and M. J. Pazzani. On the optimality of the simple bayesian classifier under zero-one loss. Machine Learning, 29(2-3):103-130, 1997.
-
(1997)
Machine Learning
, vol.29
, Issue.2-3
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.J.2
-
9
-
-
33846323118
-
Intrusion-tolerant based architecture for database system security
-
February
-
Z. Jian-ming and M. Jiang-feng. Intrusion-tolerant based architecture for database system security. Journal of Xidian University, 3(1), February 2003.
-
(2003)
Journal of Xidian University
, vol.3
, Issue.1
-
-
Jian-ming, Z.1
Jiang-feng, M.2
-
10
-
-
11044223672
-
Access-control language for multidomain environments
-
J. B. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor. Access-control language for multidomain environments. IEEE Internet Computing, 8(6):40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
11
-
-
10944270172
-
Privacy-preserving data mining: Why, how, and when
-
J.Vaidya and C. Clifton. Privacy-preserving data mining: Why, how, and when. IEEE Security and Privacy, 2(6): 19-27, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 19-27
-
-
Vaidya, J.1
Clifton, C.2
-
15
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. J. DeWitt. Limiting disclosure in hippocratic databases. In Proceedings of the 30th international conference on Very Large Data Bases (VIDE), pages 108-119, 2004.
-
(2004)
Proceedings of the 30th international conference on Very Large Data Bases (VIDE)
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
17
-
-
0003451777
-
-
Technical Report, Computer Science Laboratory, SRI International
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. A real - time intrusion detection expert system (ides) - final technical report. Technical Report, Computer Science Laboratory, SRI International, 1992.
-
(1992)
A real - time intrusion detection expert system (ides) - final technical report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
20
-
-
3142702944
-
-
R. Shariq, M. Alberto, S. S., and R. Prasan. Extending query rewriting techniques for fine-grained access control. In Proceedings of ACM SIGMOD, International Conference on Management of Data, 2004.
-
R. Shariq, M. Alberto, S. S., and R. Prasan. Extending query rewriting techniques for fine-grained access control. In Proceedings of ACM SIGMOD, International Conference on Management of Data, 2004.
-
-
-
-
23
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I.Nai-Fovino, L. P. Provenza, Y. Saygin, and Y.Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33(1):50-57, 2004.
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Nai-Fovino, I.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
24
-
-
0035163176
-
-
S. Wenhui and T. Tan. A novel intrusion detection system model for securing web-based database systems. In Proceedings of the 25th Annual International Computer Software and Applications Conference COMPSAC, 2001
-
S. Wenhui and T. Tan. A novel intrusion detection system model for securing web-based database systems. In Proceedings of the 25th Annual International Computer Software and Applications Conference (COMPSAC), 2001.
-
-
-
|