-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
4
-
N.R. Adam J.C. Wortmann 1989 Security-control methods for statistical databases: a comparative study ACM Comput. Surv. 21 4 515 556
-
(1989)
ACM Comput. Surv.
, vol.21
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0242674432
-
Hippocratic databases
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: The International Conference on Very Large Databases, pp. 143-154 (2002)
-
(2002)
The International Conference on Very Large Databases
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
35448952234
-
GhostDB: Querying visible and hidden data without leaks
-
Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., Shasha, D.: GhostDB: querying visible and hidden data without leaks. In: ACM International Conference on Management of Data (SIGMOD), pp. 677-688 (2007)
-
(2007)
ACM International Conference on Management of Data (SIGMOD)
, pp. 677-688
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Pucheral, P.4
Shasha, D.5
-
5
-
-
70349251881
-
Data degradation: Making private data less sensitive over time
-
Anciaux, N., Bouganim, L., van Heerde, H., Pucheral, P., Apers, P.M.G.: Data degradation: making private data less sensitive over time. In: ACM Conference on Information and Knowledge Management (CIKM) (2008)
-
(2008)
ACM Conference on Information and Knowledge Management (CIKM)
-
-
Anciaux, N.1
Bouganim, L.2
Van Heerde, H.3
Pucheral, P.4
Apers, P.M.G.5
-
6
-
-
68049138770
-
Memory requirements for query execution in highly constrained devices
-
Anciaux, N., Bouganim, L., Pucheral, P.: Memory requirements for query execution in highly constrained devices. In: The International Conference on Very Large Data Bases (VLDB), pp. 694-705 (2003)
-
(2003)
The International Conference on Very Large Data Bases (VLDB)
, pp. 694-705
-
-
Anciaux, N.1
Bouganim, L.2
Pucheral, P.3
-
7
-
-
62349108826
-
-
BBC News August 26
-
BBC News, Bank customer data sold on eBay, August 26, 2008. http://news.bbc.co.uk/2/hi/uk-news/7581540.stm
-
(2008)
Bank Customer Data Sold on EBay
-
-
-
8
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
7
-
B. Bloom 1970 Space/time tradeoffs in hash coding with allowable errors Commun. ACM 13 7 422 426
-
(1970)
Commun. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
9
-
-
2442517723
-
Logical and physical design issues for smart card databases
-
Bolchini, C., Salice, F., Schreiber, F., Tanca, L.: Logical and physical design issues for smart card databases, ACM Trans. Inf. Syst. 254-285 (2003)
-
(2003)
ACM Trans. Inf. Syst.
, pp. 254-285
-
-
Bolchini, C.1
Salice, F.2
Schreiber, F.3
Tanca, L.4
-
12
-
-
62349106422
-
-
Computer World December 2003
-
Computer World: NASA sites hacked. December 2003. http://www. computerworld.com/securitytopics/security/cybercrime/story/0,10801,88348,00.html
-
NASA Sites Hacked
-
-
-
13
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: ACM Conference on Computer and Communications Security (CCS), pp. 93-102 (2003)
-
(2003)
ACM Conference on Computer and Communications Security (CCS)
, pp. 93-102
-
-
Damiani, E.1
De Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
16
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: ACM International Conference on Management of Data (SIGMOD), pp. 216-227 (2002)
-
(2002)
ACM International Conference on Management of Data (SIGMOD)
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
18
-
-
52649175236
-
Issues around the protection or revelation of personal information
-
D. Hillyard M. Gauen 2007 Issues around the protection or revelation of personal information Knowl. Technol. Policy 20 2
-
(2007)
Knowl. Technol. Policy
, vol.20
, pp. 2
-
-
Hillyard, D.1
Gauen, M.2
-
22
-
-
33749607006
-
L-Diversity: Privacy beyond K-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: privacy beyond K-anonymity. In: International Conference on Data Engineering (ICDE) (2006)
-
(2006)
International Conference on Data Engineering (ICDE)
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
23
-
-
84941188232
-
Multi-table joins through bitmapped join indices
-
O'Neil, P., Graefe, G.: Multi-table joins through bitmapped join indices. In: SIGMOD Record (1995)
-
(1995)
SIGMOD Record
-
-
O'Neil, P.1
Graefe, G.2
-
28
-
-
70350132014
-
-
The Financial Times Sept.
-
The Financial Times: Chinese military hacked into Pentagon, Sept. 2007. http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html
-
(2007)
Chinese Military Hacked into Pentagon
-
-
-
29
-
-
62349090921
-
-
The Washington Post July
-
The Washington Post. Consultant Breached FBI's Computers, July 2007. http://www.washingtonpost.com/wp-dyn/content/article/2006/07/05/ AR2006070501489-pf.html
-
(2007)
Consultant Breached FBI's Computers
-
-
|