-
2
-
-
7444242205
-
The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
H. Cavusoglu, B. Mishra, and S. Raghunathan. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. Int. J. Electron. Commerce, 9(1):70-104, 2004.
-
(2004)
Int. J. Electron. Commerce
, vol.9
, Issue.1
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
3
-
-
70349311484
-
A database record encryption scheme using the RSA public key cryptosystem and its master keys
-
Washington, DC, USA, IEEE Computer Society
-
C.-C. Chang and C.-W. Chan. A database record encryption scheme using the RSA public key cryptosystem and its master keys. In ICCNMC '03: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing, page 345, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ICCNMC '03: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing
, pp. 345
-
-
Chang, C.-C.1
Chan, C.-W.2
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
New York, NY, USA, ACM
-
E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 93-102, New York, NY, USA, 2003. ACM.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
0019573099
-
A database encryption system with subkeys
-
G. I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with subkeys. ACM Trans. Database Syst., 6(2):312-328, 1981.
-
(1981)
ACM Trans. Database Syst
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
6
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
New York, NY, USA, ACM
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. A data outsourcing architecture combining cryptography and access control. In CSAW'07: Proceedings of the 2007 ACM workshop on Computer security architecture, pages 63-69, New York, NY, USA, 2007. ACM.
-
(2007)
CSAW'07: Proceedings of the 2007 ACM workshop on Computer security architecture
, pp. 63-69
-
-
di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
70349729340
-
-
T. Dierks and E. Rescorla. The TLS protocol version 1.2, 2006
-
T. Dierks and E. Rescorla. The TLS protocol version 1.2, 2006.
-
-
-
-
8
-
-
70349752521
-
-
A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol version 3.02, 1996
-
A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol version 3.02, 1996.
-
-
-
-
10
-
-
46749110435
-
On the definition and policies of confidentiality
-
Washington, DC, USA, IEEE Computer Society
-
J. H. Hammer and G. Schneider. On the definition and policies of confidentiality. In IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security, pages 337-342, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security
, pp. 337-342
-
-
Hammer, J.H.1
Schneider, G.2
-
11
-
-
52249102342
-
Information security management standard
-
ISO/IEC
-
ISO/IEC. Information security management standard. 2005.
-
(2005)
-
-
-
12
-
-
84893309371
-
A framework for efficient storage security in RDBMS
-
B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, , and Y. Wu. A framework for efficient storage security in RDBMS. In EDBT, 2004.
-
(2004)
EDBT
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
13
-
-
0034873626
-
Cryptography and relational database management systems
-
Washington, DC, USA, IEEE Computer Society
-
H. Jingmin and M. Wang. Cryptography and relational database management systems. In IDEAS '01: Proceedings of the International Database Engineering & Applications Symposium, pages 273-284, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
IDEAS '01: Proceedings of the International Database Engineering & Applications Symposium
, pp. 273-284
-
-
Jingmin, H.1
Wang, M.2
-
14
-
-
33846956427
-
Incorporating a secure coprocessor in the Database-as-a-Service model
-
Washington, DC, USA, IEEE Computer Society
-
E. Mykletun and G. Tsudik. Incorporating a secure coprocessor in the Database-as-a-Service model. In IWIA '05: Proceedings of the Innovative Architecture on Future Generation High-Performance Processors and Systems, pages 38-44, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
IWIA '05: Proceedings of the Innovative Architecture on Future Generation High-Performance Processors and Systems
, pp. 38-44
-
-
Mykletun, E.1
Tsudik, G.2
-
15
-
-
0011582174
-
-
confidentiality, disclosure, and data access: Theory and practical applications for statistical agencies
-
L. Sweeney. Information explosion. in confidentiality, disclosure, and data access: Theory and practical applications for statistical agencies. 2001.
-
(2001)
Information explosion
-
-
Sweeney, L.1
-
16
-
-
85011072055
-
Security in outsourcing of association rule mining
-
VLDB Endowment
-
W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis. Security in outsourcing of association rule mining. In VLDB '07: Proceedings of the 33rd international conference on Very large data bases, pages 111-122. VLDB Endowment, 2007.
-
(2007)
VLDB '07: Proceedings of the 33rd international conference on Very large data bases
, pp. 111-122
-
-
Wong, W.K.1
Cheung, D.W.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
|