메뉴 건너뛰기




Volumn 19, Issue 3, 2008, Pages 1-21

A multiple-bits watermark for relational data

Author keywords

Database; Ownership proof; Watermark

Indexed keywords

DATABASE SYSTEMS;

EID: 50549096535     PISSN: 10638016     EISSN: 15338010     Source Type: Journal    
DOI: 10.4018/jdm.2008070101     Document Type: Article
Times cited : (8)

References (30)
  • 1
    • 0041513205 scopus 로고    scopus 로고
    • Water-marking relational data: Framework, algorithms and analysis
    • Agrawal, R., Haas,P.J., & Kiernan, J. (2003). Water-marking relational data: Framework, algorithms and analysis. The VLDB Journal, 12(2), 157-169.
    • (2003) The VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 2
    • 18844365338 scopus 로고    scopus 로고
    • Watermarking relational databases
    • Agrawal, R., & Kiernan, J. (2002). Watermarking relational databases. Proceedings of VLDB (pp. 155-166).
    • (2002) Proceedings of VLDB , pp. 155-166
    • Agrawal, R.1    Kiernan, J.2
  • 4
    • 84957670625 scopus 로고
    • Collusion secure fingerprinting for digital data (extended abstract)
    • Boneh, D., & Shaw, J. (1995). Collusion secure fingerprinting for digital data (extended abstract). Crypto, 452-465.
    • (1995) Crypto , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 5
    • 0032162672 scopus 로고    scopus 로고
    • Collusion secure fingerprinting for digital data
    • Boneh, D., & Shaw, J. (1998). Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5), 1897-1905.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 7
    • 34247403679 scopus 로고    scopus 로고
    • Database piracy plague
    • March 1, Retrieved from
    • Gray, B., & Gorelick, J. (2004, March 1). Database piracy plague. The Washington Times. Retrieved from http://www.washingtontimes. com
    • (2004) The Washington Times
    • Gray, B.1    Gorelick, J.2
  • 9
    • 33749679756 scopus 로고    scopus 로고
    • Chaining watermarks for detecting malicious modifications to streaming data
    • Guo H., Li, Y., & Jajodia, S. (2007). Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences, 177(1), 281-298.
    • (2007) Information Sciences , vol.177 , Issue.1 , pp. 281-298
    • Guo, H.1    Li, Y.2    Jajodia, S.3
  • 10
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of relational databases
    • Guo, H., Li, Y., Liu, A., & Jajodia, S. (2006). A fragile watermarking scheme for detecting malicious modifications of relational databases. Information Sciences, 176(10), 1350-1378.
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3    Jajodia, S.4
  • 14
    • 34147137735 scopus 로고    scopus 로고
    • A measurement ontology generalizable for emerging domain applications on the Semantic Web
    • Kim, H. M., Sengupta,A., Fox, M. S., & Dalkilic, M. (2007). A measurement ontology generalizable for emerging domain applications on the Semantic Web. Journal of Database Management, 18(1), 20-42.
    • (2007) Journal of Database Management , vol.18 , Issue.1 , pp. 20-42
    • Kim, H.M.1    Sengupta, A.2    Fox, M.S.3    Dalkilic, M.4
  • 22
    • 34147174506 scopus 로고    scopus 로고
    • Optimization of multidimensional aggregates in data warehouses
    • Pears, R., & Houliston, B. (2007). Optimization of multidimensional aggregates in data warehouses. Journal of Database Management, 18(1), 69-93.
    • (2007) Journal of Database Management , vol.18 , Issue.1 , pp. 69-93
    • Pears, R.1    Houliston, B.2
  • 23
    • 0042431696 scopus 로고    scopus 로고
    • Data protection using watermarking in e-business
    • Pons,A. P., & Aljifri, H. (2003). Data protection using watermarking in e-business.Journal of Database Management, 14(4), 1-13.
    • (2003) Journal of Database Management , vol.14 , Issue.4 , pp. 1-13
    • Pons, A.P.1    Aljifri, H.2
  • 24
    • 0041379360 scopus 로고    scopus 로고
    • Integrating digital signatures with relational databases: Issues and organizational implications
    • Reid, R., & Dhillon, G. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management, 14(2), 42-51.
    • (2003) Journal of Database Management , vol.14 , Issue.2 , pp. 42-51
    • Reid, R.1    Dhillon, G.2
  • 25
    • 0141780092 scopus 로고    scopus 로고
    • Collusion secure q-ary fingerprinting for perceptual content
    • Safavi-Naini,R., & Wang, Y. (2001). Collusion secure q-ary fingerprinting for perceptual content. Digital Rights Management Workshop (pp. 57-75).
    • (2001) Digital Rights Management Workshop , pp. 57-75
    • Safavi-Naini, R.1    Wang, Y.2
  • 28
    • 85036881448 scopus 로고    scopus 로고
    • Vaas, L. (2003, September 24). Putting a stop to database piracy. eWeek: Enterprise News and Reviews. Retrieved from http:// www.eweek.com/print_article/0,3084,a=107965,00.asp
    • Vaas, L. (2003, September 24). Putting a stop to database piracy. eWeek: Enterprise News and Reviews. Retrieved from http:// www.eweek.com/print_article/0,3084,a=107965,00.asp


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.