메뉴 건너뛰기




Volumn , Issue , 2008, Pages 771-778

Detecting suspicious relational database queries

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DATABASE SYSTEMS; NUCLEAR PROPULSION; POLYNOMIAL APPROXIMATION;

EID: 49049112899     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.125     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 2
    • 49049109950 scopus 로고    scopus 로고
    • R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, VLDB, pages 516-527. Morgan Kaufmann, 2004.
    • R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, VLDB, pages 516-527. Morgan Kaufmann, 2004.
  • 3
    • 0242674432 scopus 로고    scopus 로고
    • Hippocratic databases
    • Morgan Kaufmann
    • R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In VLDB, pages 143-154. Morgan Kaufmann, 2002.
    • (2002) VLDB , pp. 143-154
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 4
    • 0035791550 scopus 로고    scopus 로고
    • On specifying security policies for web documents with an XML-based language
    • E. Bertino, S. Castano, and E. Ferrari. On specifying security policies for web documents with an XML-based language. In SACMAT, pages 57-65, 2001.
    • (2001) SACMAT , pp. 57-65
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 5
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331,2002.
    • (2002) ACM Trans. Inf. Syst. Secur , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 6
    • 49049098172 scopus 로고    scopus 로고
    • K. Böhm, C. S. Jensen, L. M. Haas, M. L. Kersten, P.-Å. Larson, and B. C. Ooi, editors, Trondheim, Norway, August 30, September 2, ACM
    • K. Böhm, C. S. Jensen, L. M. Haas, M. L. Kersten, P.-Å. Larson, and B. C. Ooi, editors. Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, 2005. ACM, 2005.
    • (2005) Proceedings of the 31st International Conference on Very Large Data Bases
  • 7
    • 49049113343 scopus 로고    scopus 로고
    • Information Disclosure by XPath Queries
    • S. Böttcher and R. Steinmetz. Information Disclosure by XPath Queries. In Jonkerand Petkovic [10], pages 160-174.
    • Jonkerand Petkovic , vol.10 , pp. 160-174
    • Böttcher, S.1    Steinmetz, R.2
  • 9
    • 84937420536 scopus 로고    scopus 로고
    • Securing XML Documents
    • C. Zaniolo, P. C. Lockemann, M. H. Scholl, and T. Grust, editors, EDBT, of, Springer
    • E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In C. Zaniolo, P. C. Lockemann, M. H. Scholl, and T. Grust, editors, EDBT, volume 1777 of Lecture Notes in Computer Science, pages 121-135. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1777 , pp. 121-135
    • Damiani, E.1    di Vimercati, S.D.C.2    Paraboschi, S.3    Samarati, P.4
  • 11
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient Full-Domain K-Anonymity
    • F. Özcan, editor, ACM
    • K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient Full-Domain K-Anonymity. In F. Özcan, editor, SIGMOD Conference, pages 49-60. ACM, 2005.
    • (2005) SIGMOD Conference , pp. 49-60
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 12
    • 3142691086 scopus 로고    scopus 로고
    • On the Complexity of Optimal K-Anonymity
    • A. Deutsch, editor, ACM
    • A. Meyerson and R. Williams. On the Complexity of Optimal K-Anonymity. In A. Deutsch, editor, PODS, pages 223-228. ACM, 2004.
    • (2004) PODS , pp. 223-228
    • Meyerson, A.1    Williams, R.2
  • 13
    • 0018809762 scopus 로고    scopus 로고
    • R. Munz, H.-J. Schneider, and F. Steyer. Application of Sub-Predicate Tests in Database Systems. In A. L. Furtado and H. L. Morgan, editors, VLDB, pages 426-435. IEEE Computer Society, 1979.
    • R. Munz, H.-J. Schneider, and F. Steyer. Application of Sub-Predicate Tests in Database Systems. In A. L. Furtado and H. L. Morgan, editors, VLDB, pages 426-435. IEEE Computer Society, 1979.
  • 14
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondents' Identities in Microdata Release
    • P. Samarati. Protecting Respondents' Identities in Microdata Release. IEEE Trans. Knowl. Data Eng., 13(6): 1010-1027, 2001.
    • (2001) IEEE Trans. Knowl. Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 15
    • 26844576753 scopus 로고    scopus 로고
    • Provable Data Privacy
    • K. V. Andersen, J. K. Debenham, and R. Wagner, editors, DEXA, of, Springer
    • K. Stoffel and T. Studer. Provable Data Privacy. In K. V. Andersen, J. K. Debenham, and R. Wagner, editors, DEXA, volume 3588 of Lecture Notes in Computer Science, pages 324-332. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3588 , pp. 324-332
    • Stoffel, K.1    Studer, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.