메뉴 건너뛰기




Volumn 35, Issue 2, 2010, Pages

Personalizing queries based on networks of composite preferences

Author keywords

Personalization; Preference modeling; Preference networks

Indexed keywords

DATABASE QUERIES; DIRECTED ACYCLIC GRAPHS; EFFICIENT ALGORITHM; GENERAL CLASS; PERSONALIZATIONS; PREFERENCE MODELING; PREFERENCE MODELS; PREFERENCE REPRESENTATION; QUERY PERSONALIZATION; QUERY RESULTS;

EID: 77952029785     PISSN: 03625915     EISSN: 15574644     Source Type: Journal    
DOI: 10.1145/1735886.1735892     Document Type: Article
Times cited : (27)

References (40)
  • 3
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • AKL, S. AND TAYLOR, P. 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1, 3, 239-248.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 14
    • 0010314426 scopus 로고    scopus 로고
    • THE DBLP COMPUTER SCIENCE BIBLIOGRAPHY
    • THE DBLP COMPUTER SCIENCE BIBLIOGRAPHY. The DBLP computer science bibliography. http://dblp.uni-trier.de.
    • The DBLP Computer Science Bibliography
  • 17
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • DE SANTIS, A., FERRARA, A.L., AND MASUCCI, B. 2004. Cryptographic key assignment schemes for any access control policy. Inform. Process. Lett. 92, 4, 199-205.
    • (2004) Inform. Process. Lett. , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 18
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • GUDES, E. 1980. The design of a cryptography based secure file system. IEEE Trans. Softw. Engin. 6, 5, 411-420.
    • (1980) IEEE Trans. Softw. Engin. , vol.6 , Issue.5 , pp. 411-420
    • Gudes, E.1
  • 21
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • HARN, L. AND LIN, H. 1990. A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9, 6, 539-546.
    • (1990) Comput. Secur. , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 22
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • HWANG, M. AND YANG, W. 2003. Controlling access in large partially ordered hierarchies using cryptographic keys. J. Syst. Softw. 67, 2, 99-107.
    • (2003) J. Syst. Softw. , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.1    Yang, W.2
  • 24
    • 0024738556 scopus 로고
    • On the design of a single-key-lock mechanism based on Newton's interpolating polynomial
    • LIAW, H., WANG, S., AND LEI, C. 1989. On the design of a single-key-lock mechanism based on Newton's interpolating polynomial. IEEE Trans. Softw. Engin. 15, 9, 1135-1137.
    • (1989) IEEE Trans. Softw. Engin. , vol.15 , Issue.9 , pp. 1135-1137
    • Liaw, H.1    Wang, S.2    Lei, C.3
  • 25
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MACKINNON, S., P. TAYLOR, MEIJER, H., AND AKL, S. 1985. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34, 9, 797-802.
    • (1985) IEEE Trans. Comput. , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 27
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • MYKLETUN, E., NARASIMHA, M., AND TSUDIK, G. 2006. Authentication and integrity in outsourced databases. ACM Trans. Storage 2, 2, 107-138.
    • (2006) ACM Trans. Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 28
    • 14344253515 scopus 로고    scopus 로고
    • Analysis of SIGMOD's co-authorship graph
    • NASCIMENTO, M., SANDER, J., AND POUND, J. 2003. Analysis of SIGMOD's co-authorship graph. ACM SIGMOD Rec. 32, 3, 8-10.
    • (2003) ACM SIGMOD Rec , vol.32 , Issue.3 , pp. 8-10
    • Nascimento, M.1    Sander, J.2    Pound, J.3
  • 32
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • SANDHU, R. 1988. Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 2, 95-98.
    • (1988) Inform. Process. Lett. , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.1
  • 34
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • SHEN, V. AND CHEN, T. 2002. A novel key management scheme based on discrete logarithms and polynomial interpolations. Comput. Secur. 21, 2, 164-171.
    • (2002) Comput. Secur. , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.1    Chen, T.2
  • 40
    • 77952056760 scopus 로고    scopus 로고
    • XML ENCRYPTION SYNTAX AND PROCESSING, W3C REC. 2002
    • XML ENCRYPTION SYNTAX AND PROCESSING, W3C REC. 2002. http://www.w3.org/ TR/xmlenc-core/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.