-
2
-
-
49049109950
-
-
R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, VLDB, pages 516-527. Morgan Kaufmann, 2004.
-
R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, VLDB, pages 516-527. Morgan Kaufmann, 2004.
-
-
-
-
3
-
-
0242674432
-
Hippocratic databases
-
Morgan Kaufmann
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In VLDB, pages 143-154. Morgan Kaufmann, 2002.
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
E. Bertino, S. Castano, and E. Ferrari. On specifying security policies for web documents with an XML-based language. In SACMAT, pages 57-65, 2001.
-
(2001)
SACMAT
, pp. 57-65
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
5
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331,2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
6
-
-
49049098172
-
-
K. Böhm, C. S. Jensen, L. M. Haas, M. L. Kersten, P.-Å. Larson, and B. C. Ooi, editors, Trondheim, Norway, August 30, September 2, ACM
-
K. Böhm, C. S. Jensen, L. M. Haas, M. L. Kersten, P.-Å. Larson, and B. C. Ooi, editors. Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, 2005. ACM, 2005.
-
(2005)
Proceedings of the 31st International Conference on Very Large Data Bases
-
-
-
7
-
-
49049113343
-
Information Disclosure by XPath Queries
-
S. Böttcher and R. Steinmetz. Information Disclosure by XPath Queries. In Jonkerand Petkovic [10], pages 160-174.
-
Jonkerand Petkovic
, vol.10
, pp. 160-174
-
-
Böttcher, S.1
Steinmetz, R.2
-
8
-
-
49049088806
-
Secure Anonymization for Incremental Datasets
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure Anonymization for Incremental Datasets. In Jonker and Petkovic [10], pages 48-63.
-
Jonker and Petkovic
, vol.10
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
9
-
-
84937420536
-
Securing XML Documents
-
C. Zaniolo, P. C. Lockemann, M. H. Scholl, and T. Grust, editors, EDBT, of, Springer
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In C. Zaniolo, P. C. Lockemann, M. H. Scholl, and T. Grust, editors, EDBT, volume 1777 of Lecture Notes in Computer Science, pages 121-135. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1777
, pp. 121-135
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
10
-
-
49049109343
-
-
and, editors, Springer
-
W. Jonker and M. Petkovic, editors. Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, volume 4165 of Lecture Notes in Computer Science. Springer, 2006.
-
(2006)
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, volume 4165 of Lecture Notes in Computer Science
-
-
-
11
-
-
29844444250
-
Incognito: Efficient Full-Domain K-Anonymity
-
F. Özcan, editor, ACM
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient Full-Domain K-Anonymity. In F. Özcan, editor, SIGMOD Conference, pages 49-60. ACM, 2005.
-
(2005)
SIGMOD Conference
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
12
-
-
3142691086
-
On the Complexity of Optimal K-Anonymity
-
A. Deutsch, editor, ACM
-
A. Meyerson and R. Williams. On the Complexity of Optimal K-Anonymity. In A. Deutsch, editor, PODS, pages 223-228. ACM, 2004.
-
(2004)
PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
13
-
-
0018809762
-
-
R. Munz, H.-J. Schneider, and F. Steyer. Application of Sub-Predicate Tests in Database Systems. In A. L. Furtado and H. L. Morgan, editors, VLDB, pages 426-435. IEEE Computer Society, 1979.
-
R. Munz, H.-J. Schneider, and F. Steyer. Application of Sub-Predicate Tests in Database Systems. In A. L. Furtado and H. L. Morgan, editors, VLDB, pages 426-435. IEEE Computer Society, 1979.
-
-
-
-
14
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
P. Samarati. Protecting Respondents' Identities in Microdata Release. IEEE Trans. Knowl. Data Eng., 13(6): 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
15
-
-
26844576753
-
Provable Data Privacy
-
K. V. Andersen, J. K. Debenham, and R. Wagner, editors, DEXA, of, Springer
-
K. Stoffel and T. Studer. Provable Data Privacy. In K. V. Andersen, J. K. Debenham, and R. Wagner, editors, DEXA, volume 3588 of Lecture Notes in Computer Science, pages 324-332. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3588
, pp. 324-332
-
-
Stoffel, K.1
Studer, T.2
|