-
1
-
-
35148884539
-
-
Homeland Security Act of 2002 (http://files.findlaw.com/news.findlaw.com/ cnn/docs/terrorism/hsa2002.pdf).
-
Homeland Security Act of 2002 (http://files.findlaw.com/news.findlaw.com/ cnn/docs/terrorism/hsa2002.pdf).
-
-
-
-
2
-
-
35148838822
-
-
Intelligence Reform and Terrorism Prevention Act of 2004, Section 1016 (http://files.findlaw.com/news.findlaw.com/cnn/docs/terrorism/irtpa2004.pdf).
-
Intelligence Reform and Terrorism Prevention Act of 2004, Section 1016 (http://files.findlaw.com/news.findlaw.com/cnn/docs/terrorism/irtpa2004.pdf).
-
-
-
-
3
-
-
35148883603
-
-
Executive Order Strengthening the Sharing of Terrorism Information to Protect Americans, August 24
-
Executive Order Strengthening the Sharing of Terrorism Information to Protect Americans, August 24, 2004 (http://www.whitehouse.gov/news/releases/ 2004/08/20040827-.html).
-
(2004)
-
-
-
4
-
-
35148819936
-
-
Executive Order Further Strengthening the Sharing of Terrorism Information to Protect Americans, October 25
-
Executive Order Further Strengthening the Sharing of Terrorism Information to Protect Americans, October 25, 2005 (http://www.whitehouse.gov/ news/releases/2005/10/20051025-.html).
-
(2005)
-
-
-
5
-
-
35148859577
-
-
Executive Memorandum for the Heads of Executive Departments and Agencies:, December 16
-
Executive Memorandum for the Heads of Executive Departments and Agencies: Guidelines and Requirements in Support of the Information Sharing Environment, December 16, 2005 (www.whitehouse.gov/news/releases/2005/12/20051216-10.html).
-
(2005)
Guidelines and Requirements in Support of the Information Sharing Environment
-
-
-
6
-
-
35148821651
-
-
Further Amendment to Executive Order 12958, Classified National Security Information, March 25
-
Further Amendment to Executive Order 12958, As Amended, Classified National Security Information, March 25, 2003, (www.whitehouse.gov/news/ releases/2003/03/20030325-11.html).
-
(2003)
As Amended
-
-
-
7
-
-
0242674432
-
Hippocratic Databases
-
Hong Kong, China, August
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases. Proc. of the 28th Int'l Conf. on Very Large Databases. Hong Kong, China, August 2002.
-
(2002)
Proc. of the 28th Int'l Conf. on Very Large Databases
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
85102591607
-
Limiting Disclosure in Hippocratic Databases
-
Toronto, Canada, August
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. DeWitt, Limiting Disclosure in Hippocratic Databases. Proc. of the 30th Int'l Conf. on Very Large Databases, Toronto, Canada, August 2004.
-
(2004)
Proc. of the 30th Int'l Conf. on Very Large Databases
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
9
-
-
35148885006
-
-
Multi-level Security in the Department of Defense
-
Multi-level Security in the Department of Defense: The Basics (http://nsi.org/Library/Compsec/sec0.html).
-
-
-
-
10
-
-
3142702937
-
Security of Shared Data in Large Systems: State of the Art and Research Directions
-
Toronto, Canada, August
-
A. Rosenthal, M. Winslett, Security of Shared Data in Large Systems: State of the Art and Research Directions. Proc. of the 30th Int'l Conf. on Very Large Databases, Toronto, Canada, August 2004.
-
(2004)
Proc. of the 30th Int'l Conf. on Very Large Databases
-
-
Rosenthal, A.1
Winslett, M.2
-
11
-
-
84976862905
-
Extensible/Rule Based Query Rewrite Optimization in Starburst
-
San Diego, California, USA, June
-
H. Pirahesh, J. Hellerstein, and W. Hasan, Extensible/Rule Based Query Rewrite Optimization in Starburst. Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, San Diego, California, USA, June 1992.
-
(1992)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data
-
-
Pirahesh, H.1
Hellerstein, J.2
Hasan, W.3
-
12
-
-
85135991839
-
Auditing Compliance with a Hippocratic Database
-
Toronto, Canada, August
-
R. Agrawal, R. Bayardo, C. Faloutsos, J. Kieman, R. Rantzau, and R. Srikant, Auditing Compliance with a Hippocratic Database Proc. of the 30th Int'l Conf. on Very Large Databases, Toronto, Canada, August 2004.
-
(2004)
Proc. of the 30th Int'l Conf. on Very Large Databases
-
-
Agrawal, R.1
Bayardo, R.2
Faloutsos, C.3
Kieman, J.4
Rantzau, R.5
Srikant, R.6
-
15
-
-
85054455230
-
Tamper Detection in Audit Logs
-
Toronto, Canada, August
-
R. Snodgrass, S. Yao, and C. Collberg, Tamper Detection in Audit Logs. Proc. of the 30th Int'l Conf. on Very Large Databases, Toronto, Canada, August 2004.
-
(2004)
Proc. of the 30th Int'l Conf. on Very Large Databases
-
-
Snodgrass, R.1
Yao, S.2
Collberg, C.3
-
17
-
-
0002439387
-
Why and Where: A Characterization of Data Provenance
-
London, UK, January
-
P. Buneman, S. Khanna, and W. Tan, Why and Where: A Characterization of Data Provenance. Proc. of the Int'l Conf. on Database Theory, London, UK, January 2001.
-
(2001)
Proc. of the Int'l Conf. on Database Theory
-
-
Buneman, P.1
Khanna, S.2
Tan, W.3
-
18
-
-
3142730729
-
Adapting to Source Properties in Processing Data Integration Queries
-
Paris, France, June
-
Z. Ives, D. Halevy, D. Weld, Adapting to Source Properties in Processing Data Integration Queries. Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, Paris, France, June 2004.
-
(2004)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data
-
-
Ives, Z.1
Halevy, D.2
Weld, D.3
|