메뉴 건너뛰기




Volumn , Issue , 2008, Pages 127-131

A new watermarking approach for relational data

Author keywords

Relational database; Watermarking

Indexed keywords

DIGITAL ASSETS; MALICIOUS ATTACK; RELATIONAL DATA; RELATIONAL DATABASE; VARIOUS ATTACKS; WATERMARKING TECHNIQUES;

EID: 70449937945     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1593105.1593138     Document Type: Conference Paper
Times cited : (28)

References (9)
  • 1
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking relational data: Framework, algorithms and analysis
    • DOI=http://dx.doi.org/10.1007/s00778-003-0097-x, Aug
    • Agrawal, R., Haas, P., and Kiernan, J. 2003. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 2 (Aug. 2003), 157-169. DOI=http://dx.doi.org/10.1007/s00778-003-0097-x
    • (2003) The VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.2    Kiernan, J.3
  • 2
    • 34247371496 scopus 로고    scopus 로고
    • Li, Y. and Deng, R. H. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security (Taipei, Taiwan, March 21-24, 2006). ASIACCS '06. ACM, New York, NY, 78-89. DOI=http://doi.acm.org/10. 1145/1128817.1128832
    • Li, Y. and Deng, R. H. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security (Taipei, Taiwan, March 21-24, 2006). ASIACCS '06. ACM, New York, NY, 78-89. DOI=http://doi.acm.org/10. 1145/1128817.1128832
  • 3
    • 35248861089 scopus 로고    scopus 로고
    • Zhou, X., Huang, M., and Peng, Z. 2007. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, March 11-15, 2007). SAC '07. ACM, New York, NY, 254-258. DOI=http://doi.acm. org/10.1145/1244002.1244066
    • Zhou, X., Huang, M., and Peng, Z. 2007. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, March 11-15, 2007). SAC '07. ACM, New York, NY, 254-258. DOI=http://doi.acm. org/10.1145/1244002.1244066
  • 5
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on Copyright Marking Systems
    • Proceedings of the Second international Workshop on information Hiding April 14-17, D. Aucsmith, Ed, Springer-Verlag, London
    • Petitcolas, F. A., Anderson, R. J., and Kuhn, M. G. 1998. Attacks on Copyright Marking Systems. In Proceedings of the Second international Workshop on information Hiding (April 14-17, 1998). D. Aucsmith, Ed. Lecture Notes In Computer Science, vol. 1525. Springer-Verlag, London, 218-238.
    • (1998) Lecture Notes In Computer Science , vol.1525 , pp. 218-238
    • Petitcolas, F.A.1    Anderson, R.J.2    Kuhn, M.G.3
  • 6
    • 1142303694 scopus 로고    scopus 로고
    • Sion, R., Atallah, M., and Prabhakar, S. 2003. Rights protection for relational data. In Proceedings of the 2003 ACM SIGMOD international Conference on Management of Data (San Diego, California, June 09-12, 2003). SIGMOD '03. ACM, New York, NY, 98-109. DOI=http://doi.acm.org/10.1145/872757. 872772
    • Sion, R., Atallah, M., and Prabhakar, S. 2003. Rights protection for relational data. In Proceedings of the 2003 ACM SIGMOD international Conference on Management of Data (San Diego, California, June 09-12, 2003). SIGMOD '03. ACM, New York, NY, 98-109. DOI=http://doi.acm.org/10.1145/872757. 872772
  • 7
    • 34248225546 scopus 로고    scopus 로고
    • Yong, Z., Xia-mu, N., Khan, A., Qiong, L., and Qi, H. 2006. A novel method of watermarking relational databases using character string. In Proceedings of the 24th IASTED international Conference on Artificial intelligence and Applications (Innsbruck, Austria, February 13-16, 2006). V. Deved, Ed. International Association Of Science And Technology For Development. ACTA Press, Anaheim, CA, 120-124.
    • Yong, Z., Xia-mu, N., Khan, A., Qiong, L., and Qi, H. 2006. A novel method of watermarking relational databases using character string. In Proceedings of the 24th IASTED international Conference on Artificial intelligence and Applications (Innsbruck, Austria, February 13-16, 2006). V. Deved, Ed. International Association Of Science And Technology For Development. ACTA Press, Anaheim, CA, 120-124.
  • 8
    • 70449832148 scopus 로고    scopus 로고
    • Anderson, R. J. 2001 Security Engineering: a Guide to Building Dependable Distributed Systems. 1st. John Wiley & Sons, Inc.
    • Anderson, R. J. 2001 Security Engineering: a Guide to Building Dependable Distributed Systems. 1st. John Wiley & Sons, Inc.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.