-
1
-
-
28444446666
-
Extending Relational Database Systems to Automatically Enforce Privacy Policies
-
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, W. Rjaibi: Extending Relational Database Systems to Automatically Enforce Privacy Policies. In ICDE, pages 1013-1022, 2005.
-
(2005)
ICDE
, pp. 1013-1022
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibi, W.6
-
2
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. on Knowl. and Data Engg., 12(6):900-919, 2000.
-
(2000)
IEEE Trans. on Knowl. and Data Engg
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
3
-
-
84958776545
-
Optimal Implementation of conjunctive queries in relational databases
-
A.K Chandra and P.M Merlin, Optimal Implementation of conjunctive queries in relational databases. STOC, 1977
-
(1977)
STOC
-
-
Chandra, A.K.1
Merlin, P.M.2
-
4
-
-
85102591607
-
Limiting disclosure in Hippocratic data-bases
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu and D. DeWitt, Limiting disclosure in Hippocratic data-bases, In VLDB, 2004
-
(2004)
VLDB
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
5
-
-
0027221223
-
The Volcano Optimizer Generator: Extensibility and Efficient Search
-
G. Graefe, W. McKenna, The Volcano Optimizer Generator: Extensibility and Efficient Search, In ICDE, 1993
-
(1993)
ICDE
-
-
Graefe, G.1
McKenna, W.2
-
6
-
-
34250616127
-
The Cascades Optimization Framework
-
G. Graefe, The Cascades Optimization Framework, Data Engg. Bulletin, 1995
-
(1995)
Data Engg. Bulletin
-
-
Graefe, G.1
-
8
-
-
0024863856
-
An access authorization model for relational data-bases based on algebraic manipulation of view definitions
-
A. Motro. An access authorization model for relational data-bases based on algebraic manipulation of view definitions. In ICDE, pages 339-347, 1989.
-
(1989)
ICDE
, pp. 339-347
-
-
Motro, A.1
-
10
-
-
34250614138
-
-
New Security Features in Sybase Adaptive Server Enterprise. Sybase Technical White Paper, 2003
-
New Security Features in Sybase Adaptive Server Enterprise. Sybase Technical White Paper, 2003.
-
-
-
-
11
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. Mendelzon, S. Sudarshan and P. Roy, Extending query rewriting techniques for fine-grained access control. In SIGMOD, 2004
-
(2004)
SIGMOD
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
13
-
-
84914732721
-
Access control in a relational database management system by query modification
-
M. Stonebraker and E. Wong. Access control in a relational database management system by query modification. In Procs of the ACM Annual Conference, pages 180-186, 1974.
-
(1974)
Procs of the ACM Annual Conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
|