메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 78-89

Publicly verifiable ownership protection for relational databases

Author keywords

Certificate; Ownership protection; Public verifiability; Relational database; Watermark

Indexed keywords

COMPUTER CRIME; DATABASE SYSTEMS; DIGITAL WATERMARKING; EMBEDDED SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); USER INTERFACES;

EID: 34247371496     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128832     Document Type: Conference Paper
Times cited : (44)

References (34)
  • 1
    • 18844365338 scopus 로고    scopus 로고
    • Watermarking relational databases
    • R. Agrawal and J. Kiernan. Watermarking relational databases. In Proceedings of VLDB, pages 155-166, 2002.
    • (2002) Proceedings of VLDB , pp. 155-166
    • Agrawal, R.1    Kiernan, J.2
  • 4
    • 34247340386 scopus 로고    scopus 로고
    • Piracy is unacceptable in the information age or any other age, July 2
    • Coalition Against Database Piracy (CADP). Piracy is unacceptable in the information age or any other age, July 2, 2005. http://cadp.net/defaultasp.
    • (2005) Coalition Against Database Piracy (CADP)
  • 5
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and Coding, Institute of Mathematics and Its Applications International Conference on Cryp- tography and Coding, Proceedings of IMA 2001
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding - Institute of Mathematics and Its Applications International Conference on Cryp- tography and Coding - Proceedings of IMA 2001, LNCS 2260, pages 360-363, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 8
    • 0035763272 scopus 로고    scopus 로고
    • S. Craver and S. Katzenbeisser. Security analysis of public-key watermarking schemes. In SPIE 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, pages 172-182, 2001.
    • S. Craver and S. Katzenbeisser. Security analysis of public-key watermarking schemes. In SPIE Vol. 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, pages 172-182, 2001.
  • 11
    • 0034769637 scopus 로고    scopus 로고
    • T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric watermarking schemes. In SPIE 4314, Security and Watermarking of Multimedia Contents III, pages 269-279, 2001.
    • T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric watermarking schemes. In SPIE Vol. 4314, Security and Watermarking of Multimedia Contents III, pages 269-279, 2001.
  • 12
    • 34247403679 scopus 로고    scopus 로고
    • Database piracy plague
    • March 1
    • B. Gray and J. Gorelick. Database piracy plague. The Washington Times, March 1, 2004. http://www.washingtontimes.com.
    • (2004) The Washington Times
    • Gray, B.1    Gorelick, J.2
  • 16
    • 34247392288 scopus 로고    scopus 로고
    • R. Housley, W. Ford, W. Polk, and D. Solo. Internet x.509 public key infrastructure certificate and crl profile, July 2, 2005. http://www.ietf.org/ rfc/rfc2459.txt.
    • R. Housley, W. Ford, W. Polk, and D. Solo. Internet x.509 public key infrastructure certificate and crl profile, July 2, 2005. http://www.ietf.org/ rfc/rfc2459.txt.
  • 23
    • 0004179384 scopus 로고    scopus 로고
    • Efficient certificate revocation
    • Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA
    • S. Micali. Efficient certificate revocation. In Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA, 1996.
    • (1996)
    • Micali, S.1
  • 32
    • 19944418626 scopus 로고    scopus 로고
    • Putting a stop to database piracy
    • September 24, 3048,a= 107965,00.asp
    • L. Vaas. Putting a stop to database piracy. eWEEK, enterprise news and reviews, September 24, 2003. http://www.eweek.com/print_article/0,3048,a= 107965,00.asp.
    • (2003) eWEEK, enterprise news and reviews
    • Vaas, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.