-
1
-
-
0004190705
-
-
ACM Press, New York
-
Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press, New York (1995)
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
4
-
-
37849044228
-
-
Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, 2316, Springer, Heidelberg (2002)
-
Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, Springer, Heidelberg (2002)
-
-
-
-
5
-
-
3543091604
-
Securing OLAP data cubes against privacy breaches
-
IEEE Computer Society, Los Alamitos
-
Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161-178. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 161-178
-
-
Wang, L.1
Jajodia, S.2
Wijesekera, D.3
-
6
-
-
0142219258
-
Precisely answering multi-dimensional range queries without privacy breaches
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
-
-
Wang, L.1
Li, Y.2
Wijesekera, D.3
Jajodia, S.4
-
7
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering 12(6), 900-919 (2000)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
8
-
-
0025442003
-
The seaview security model
-
Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M., Shockley, W.R.: The seaview security model. IEEE Transactions on Software Engineering 16(6), 593-607 (1990)
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
11
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Transactions on Database Systems 19(4), 626-662 (1994)
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
12
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
13
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Transactions on Database Systems 8(1), 41-59 (1983)
-
(1983)
ACM Transactions on Database Systems
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
de Jonge, W.2
van de Riet, R.P.3
-
14
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.: Foundations of secure deductive databases. IEEE Transactions on Knowledge and Data Engineering 7(3), 406-422 (1995)
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.3
-
15
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup, J.: For unknown secrecies refusal is better than lying. Data & Knowledge Engineering 33, 1-23 (2000)
-
(2000)
Data & Knowledge Engineering
, vol.33
, pp. 1-23
-
-
Biskup, J.1
-
16
-
-
33745644253
-
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, 3861, pp. 43-62. Springer, Heidelberg (2006)
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, vol. 3861, pp. 43-62. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering 38, 199-222 (2001)
-
(2001)
Data & Knowledge Engineering
, vol.38
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
18
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3, 14-27 (2004)
-
(2004)
International Journal of Information Security
, vol.3
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
20
-
-
84902456527
-
-
Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Research Directions in Data and Applications Security XVIII, pp. 143-157 Kluwer/Springer (2004)
-
Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Research Directions in Data and Applications Security XVIII, pp. 143-157 Kluwer/Springer (2004)
-
-
-
-
21
-
-
37849026140
-
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Submitted, 2007. Extended abstract presented at the LICS'05 Affiliated Workshop on Foundations of Computer Security (FCS'05), available from http://www.es.Chalmers.se/andrei/FCS05/fcs05.pdf (2005)
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Submitted, 2007. Extended abstract presented at the LICS'05 Affiliated Workshop on Foundations of Computer Security (FCS'05), available from http://www.es.Chalmers.se/andrei/FCS05/fcs05.pdf (2005)
-
-
-
-
22
-
-
0003730235
-
-
MIT Press, Cambridge
-
Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press, Cambridge (1995)
-
(1995)
Reasoning About Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
24
-
-
33845239096
-
-
Winslett, M.: An introduction to trust negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, pp. 275-283. Springer, Heidelberg (2003)
-
Winslett, M.: An introduction to trust negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 275-283. Springer, Heidelberg (2003)
-
-
-
|