-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
AGGARWAL, G., BAWA, M., GANESAN, P., GARCIA-MOLINA, H., KENTHAPADI, K., MOTWANI, R., SRIVASTAVA, U., THOMAS, D., AND XU, Y. 2005. Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Conference on Innovative Data Systems Research. http://www.cidrdb.org/.
-
(2005)
Proceedings of the Conference on Innovative Data Systems Research
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
BISKUP, J., EMBLEY, D., AND LOCHNER, J. 2008. Reducing inference control to access control for normalized database schemas. Inform. Process. Lett. 106, 1, 8-12.
-
(2008)
Inform. Process. Lett.
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.2
Lochner, J.3
-
4
-
-
85043029738
-
-
CA SB 1386. 2002. California senate bill SB 1386
-
CA SB 1386. 2002. California senate bill SB 1386.
-
-
-
-
5
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
CESELLI, A., DAMIANI, E., DE CAPITANI DI VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2005. Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inform. Syst. Secur. 8, 1, 119-152.
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Springer, Berlin
-
CIRIANI, V., DE CAPITANI DI VIMERCATI, S., FORESTI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2007a. Fragmentation and encryption to enforce privacy in data storage. In Proceedings of the 12th European Symposium on Research in Computer Security. Springer, Berlin.
-
(2007)
Proceedings of the 12th European Symposium on Research in Computer Security
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
79960907469
-
K-Anonymity
-
T. Yu and S. Jajodia, Eds. Springer-Verlag, Berlin
-
CIRIANI, V., DE CAPITANI DI VIMERCATI, S., FORESTI, S., AND SAMARATI, P. 2007b. k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, Eds. Springer-Verlag, Berlin.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
9
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
ACM, New York
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2003. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proceedings of the 10th Conference on Computer and Communications Security. ACM, New York.
-
(2003)
Proceedings of the 10th Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
3042717763
-
Maximizing sharing of protected information
-
DAWSON, S., DE CAPITANI DI VIMERCATI, S., LINCOLN, P., AND SAMARATI, P. 2002. Maximizing sharing of protected information. J. Comput. Syst. Sci. 64, 3, 496-541.
-
(2002)
J. Comput. Syst. Sci.
, vol.64
, Issue.3
, pp. 496-541
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
12
-
-
0036204131
-
Providing database as a service
-
IEEE, Los Alamitos, CA
-
HACIGÜMÜS, H., IYER, B., ANDMEHROTRA, S. 2002a. Providing database as a service. In Proceedings of the 18th International Conference on Data Engineering. IEEE, Los Alamitos, CA.
-
(2002)
Proceedings of the 18th International Conference on Data Engineering
-
-
Hacigümüs, H.1
Iyer, B.2
Andmehrotra, S.3
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM, New York
-
HACIGÜMÜS, H., IYER, B.,MEHROTRA, S., AND LI, C. 2002b. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the SIGMOD International Conference on Management of Data. ACM, New York.
-
(2002)
Proceedings of the SIGMOD International Conference on Management of Data
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
15
-
-
0242583681
-
Approximate coloring of uniform hypergraphs
-
KRIVELEVICH, M. AND SUDAKOV, B. 2003. Approximate coloring of uniform hypergraphs. J. Algorithms 49, 1, 2-12.
-
(2003)
J. Algorithms
, vol.49
, Issue.1
, pp. 2-12
-
-
Krivelevich, M.1
Sudakov, B.2
-
16
-
-
0021625744
-
Vertical partitioning algorithms for database design
-
NAVATHE, S., CERI, S., WIEDERHOLD, G., AND DOU, J. 1984. Vertical partitioning algorithms for database design. ACM Trans. Datab. Syst. 9, 4, 680-710.
-
(1984)
ACM Trans. Datab. Syst.
, vol.9
, Issue.4
, pp. 680-710
-
-
Navathe, S.1
Ceri, S.2
Wiederhold, G.3
Dou, J.4
-
19
-
-
85043067738
-
-
PERSONAL DATA PROTECTION CODE. 2003. Legislative Decree no. 196
-
PERSONAL DATA PROTECTION CODE. 2003. Legislative Decree no. 196.
-
-
-
-
21
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
SAMARATI, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6, 1010-1017.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1017
-
-
Samarati, P.1
-
23
-
-
85043083391
-
Reliable processing of confidential information
-
Springer, Berlin
-
TROUESSIN, G.,FABRE, J. C., ANDDESWARTE,Y. 1991. Reliable processing of confidential information. In Proceedings of the 7th International Information Security Conference. Springer, Berlin.
-
(1991)
Proceedings of the 7th International Information Security Conference
-
-
Trouessin, G.1
Fabre, J.C.2
Deswarte, Y.3
|