-
2
-
-
20744431889
-
Enhancing database access control by facilitating non-key related cover stories
-
Jukic, N., Nestorov, S., Vrbsky, S.V., Parrish, A.S.: Enhancing database access control by facilitating non-key related cover stories. Journal of Database Management 16(3), 1-20 (2005)
-
(2005)
Journal of Database Management
, vol.16
, Issue.3
, pp. 1-20
-
-
Jukic, N.1
Nestorov, S.2
Vrbsky, S.V.3
Parrish, A.S.4
-
4
-
-
85029488605
-
-
Sandhu, R.S., Jajodia, S.: Polyinstantation for cover stories. In: Second ESOPJCS. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, 648, pp. 307-328. Springer, Heidelberg (1992)
-
Sandhu, R.S., Jajodia, S.: Polyinstantation for cover stories. In: Second ESOPJCS. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 307-328. Springer, Heidelberg (1992)
-
-
-
-
6
-
-
67650486144
-
-
Stouppa, P., Studer, T.: Data privacy for knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, 5407, pp. 409-421. Springer, Heidelberg (2009)
-
Stouppa, P., Studer, T.: Data privacy for knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol. 5407, pp. 409-421. Springer, Heidelberg (2009)
-
-
-
-
7
-
-
18144386595
-
Data exchange: Semantics and query answering
-
Fagin, R., Kolaitis, P.G., Miller, R.J., Popa, L.: Data exchange: semantics and query answering. Theoretical Computer Science 336(1), 89-124 (2005)
-
(2005)
Theoretical Computer Science
, vol.336
, Issue.1
, pp. 89-124
-
-
Fagin, R.1
Kolaitis, P.G.2
Miller, R.J.3
Popa, L.4
-
8
-
-
84878734696
-
-
Chomicki, J.: Consistent query answering: Five easy pieces. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, 4353, pp. 1-17. Springer, Heidelberg (2006)
-
Chomicki, J.: Consistent query answering: Five easy pieces. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol. 4353, pp. 1-17. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
10
-
-
34547684253
-
Controlled query evaluation with open queries for a decid-able relational submodel
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decid-able relational submodel. Annals of Mathematics and Artificial Intelligence 50(1-2), 39-77 (2007)
-
(2007)
Annals of Mathematics and Artificial Intelligence
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
12
-
-
0004276026
-
-
Springer, Heidelberg
-
Borger, E., Grädel, E., Gurevich, Y.: The Classical Decision Problem. Springer, Heidelberg (2001)
-
(2001)
The Classical Decision Problem
-
-
Borger, E.1
Grädel, E.2
Gurevich, Y.3
-
13
-
-
0003928313
-
-
Addison-Wesley, Reading
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
15
-
-
38149011376
-
Inference control in logic databases as a constraint satisfaction problem
-
McDaniel, P, Gupta, S.K, eds, ICISS 2007, Springer, Heidelberg
-
Biskup, J., Burgard, D.M., Weibert, T., Wiese, L.: Inference control in logic databases as a constraint satisfaction problem. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 128-142. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4812
, pp. 128-142
-
-
Biskup, J.1
Burgard, D.M.2
Weibert, T.3
Wiese, L.4
-
18
-
-
21844508693
-
Domain independence and the relational calculus
-
Hull, R., Su, J.: Domain independence and the relational calculus. Acta Informat-ica31(6), 513-524 (1994)
-
(1994)
Acta Informat-ica31
, pp. 513-524
-
-
Hull, R.1
Su, J.2
-
19
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 171-186
-
-
Ciriani, V.1
De Capitani di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
|