-
1
-
-
0041513205
-
Water-marking relational data: Framework, algorithms and analysis
-
Agrawal, R., Haas,P.J., & Kiernan, J. (2003). Water-marking relational data: Framework, algorithms and analysis. The VLDB Journal, 12(2), 157-169.
-
(2003)
The VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
2
-
-
18844365338
-
Watermarking relational databases
-
Agrawal, R., & Kiernan, J. (2002). Watermarking relational databases. Proceedings of VLDB (pp. 155-166).
-
(2002)
Proceedings of VLDB
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
3
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
Bertino, E., Ooi, B. C., Yang, Y., & Deng, R. (2005). Privacy and ownership preserving of outsourced medical data. Proceedings of IEEE International Conference on Data Engineering (pp. 521-532).
-
(2005)
Proceedings of IEEE International Conference on Data Engineering
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.4
-
4
-
-
84957670625
-
Collusion secure fingerprinting for digital data (extended abstract)
-
Boneh, D., & Shaw, J. (1995). Collusion secure fingerprinting for digital data (extended abstract). Crypto, 452-465.
-
(1995)
Crypto
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0032162672
-
Collusion secure fingerprinting for digital data
-
Boneh, D., & Shaw, J. (1998). Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
7
-
-
34247403679
-
Database piracy plague
-
March 1, Retrieved from
-
Gray, B., & Gorelick, J. (2004, March 1). Database piracy plague. The Washington Times. Retrieved from http://www.washingtontimes. com
-
(2004)
The Washington Times
-
-
Gray, B.1
Gorelick, J.2
-
9
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
Guo H., Li, Y., & Jajodia, S. (2007). Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences, 177(1), 281-298.
-
(2007)
Information Sciences
, vol.177
, Issue.1
, pp. 281-298
-
-
Guo, H.1
Li, Y.2
Jajodia, S.3
-
10
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of relational databases
-
Guo, H., Li, Y., Liu, A., & Jajodia, S. (2006). A fragile watermarking scheme for detecting malicious modifications of relational databases. Information Sciences, 176(10), 1350-1378.
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liu, A.3
Jajodia, S.4
-
11
-
-
33750225759
-
Rights protection for data cubes
-
Guo, J., Li, Y., Deng, R. H., & Chen, K. (2006). Rights protection for data cubes. Proceedings of Information Security Conference (ISC) (pp. 359-372).
-
(2006)
Proceedings of Information Security Conference (ISC)
, pp. 359-372
-
-
Guo, J.1
Li, Y.2
Deng, R.H.3
Chen, K.4
-
14
-
-
34147137735
-
A measurement ontology generalizable for emerging domain applications on the Semantic Web
-
Kim, H. M., Sengupta,A., Fox, M. S., & Dalkilic, M. (2007). A measurement ontology generalizable for emerging domain applications on the Semantic Web. Journal of Database Management, 18(1), 20-42.
-
(2007)
Journal of Database Management
, vol.18
, Issue.1
, pp. 20-42
-
-
Kim, H.M.1
Sengupta, A.2
Fox, M.S.3
Dalkilic, M.4
-
20
-
-
19944413957
-
Fingerprinting relational databases: Schemes and specialties
-
Li,Y., Swarup,V., & Jajodia, S. (2005). Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2, 34-45.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
22
-
-
34147174506
-
Optimization of multidimensional aggregates in data warehouses
-
Pears, R., & Houliston, B. (2007). Optimization of multidimensional aggregates in data warehouses. Journal of Database Management, 18(1), 69-93.
-
(2007)
Journal of Database Management
, vol.18
, Issue.1
, pp. 69-93
-
-
Pears, R.1
Houliston, B.2
-
23
-
-
0042431696
-
Data protection using watermarking in e-business
-
Pons,A. P., & Aljifri, H. (2003). Data protection using watermarking in e-business.Journal of Database Management, 14(4), 1-13.
-
(2003)
Journal of Database Management
, vol.14
, Issue.4
, pp. 1-13
-
-
Pons, A.P.1
Aljifri, H.2
-
24
-
-
0041379360
-
Integrating digital signatures with relational databases: Issues and organizational implications
-
Reid, R., & Dhillon, G. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management, 14(2), 42-51.
-
(2003)
Journal of Database Management
, vol.14
, Issue.2
, pp. 42-51
-
-
Reid, R.1
Dhillon, G.2
-
28
-
-
85036881448
-
-
Vaas, L. (2003, September 24). Putting a stop to database piracy. eWeek: Enterprise News and Reviews. Retrieved from http:// www.eweek.com/print_article/0,3084,a=107965,00.asp
-
Vaas, L. (2003, September 24). Putting a stop to database piracy. eWeek: Enterprise News and Reviews. Retrieved from http:// www.eweek.com/print_article/0,3084,a=107965,00.asp
-
-
-
-
29
-
-
47349088866
-
Temporal aggregation using a multidimensional index
-
Woo, J. H., Lee, B. S., Lee, M. J., Loh, W. K., & Whang, K. Y. (2007). Temporal aggregation using a multidimensional index. Journal of Database Management, 18(2), 62-79.
-
(2007)
Journal of Database Management
, vol.18
, Issue.2
, pp. 62-79
-
-
Woo, J.H.1
Lee, B.S.2
Lee, M.J.3
Loh, W.K.4
Whang, K.Y.5
-
30
-
-
50549103911
-
Query-based watermarking for XML data
-
Zhou, X., Pang, H. H., & Tan, K. L. (2007). Query-based watermarking for XML data. Proceedings of ACM Symposium on Information, Computer and Communication Security (ASIACCS) (pp. 253-264).
-
(2007)
Proceedings of ACM Symposium on Information, Computer and Communication Security (ASIACCS)
, pp. 253-264
-
-
Zhou, X.1
Pang, H.H.2
Tan, K.L.3
|