-
3
-
-
33847249399
-
-
TWIRL and RSA Key Size, http://www.rsasecurity.com/rsalabs/node.asp? id=2004
-
TWIRL and RSA Key Size
-
-
-
4
-
-
0242674432
-
Hippocratic databases
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the International Conference on Very Large Databases VLDB, pp. 143-154 (2002)
-
(2002)
Proceedings of the International Conference on Very Large Databases VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
6
-
-
84904248949
-
Author-X: A Java- Based System for XML Data Protection
-
Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-X: A Java- Based System for XML Data Protection. In: IFIP DBSec, pp. 15-26 (2000)
-
(2000)
IFIP DBSec
, pp. 15-26
-
-
Bertino, E.1
Braun, M.2
Castano, S.3
Ferrari, E.4
Mesiti, M.5
-
7
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems 17(2) (1999)
-
(1999)
ACM Transactions on Information Systems
, vol.17
, Issue.2
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
8
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422-426 (1970)
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
9
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Advances in Cryptology - EUROCRYPT 2004
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004) (Pubitemid 38717023)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
10
-
-
33644905483
-
Network applications of bloom filters: A survey
-
Broder, A., Mitzenmacher, M., Mitzenmacher, A.B.I.M.: Network applications of bloom filters: A survey. In: Internet Mathematics, pp. 636-646 (2002)
-
(2002)
Internet Mathematics
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
Mitzenmacher, A.B.I.M.3
-
11
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: ACNS (2005)
-
ACNS (2005)
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
12
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
ACM Press, New York
-
Clifton, C., Kantarcioglu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A., Suciu, D.: Privacy-preserving data integration and sharing. In: The 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pp. 19-26. ACM Press, New York (2004)
-
(2004)
The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
13
-
-
0003504808
-
Security and privacy implications of data mining
-
University of British Columbia
-
Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Workshop on Data Mining and Knowledge Discovery Computer Sciences, Montreal, Canada, pp. 15-19. University of British Columbia (1996)
-
(1996)
Workshop on Data Mining and Knowledge Discovery Computer Sciences, Montreal, Canada
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
14
-
-
77958484856
-
Authentic third-party data publication
-
Devanbu, P.T., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: IFIP Workshop on Database Security, pp. 101-112 (2000)
-
(2000)
IFIP Workshop on Database Security
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
15
-
-
0031635768
-
Fuzzy queries in multimedia database systems
-
Fagin, R.: Fuzzy queries in multimedia database systems. In: Proceedings of the 17th PODS, pp. 1-10 (1998)
-
(1998)
Proceedings of the 17th PODS
, pp. 1-10
-
-
Fagin, R.1
-
17
-
-
70349279685
-
-
Technical report, Gartner Group/Dataquest
-
Gartner, Inc., Server Storage and RAID Worldwide. Technical report, Gartner Group/Dataquest (1999), http://www.gartner.com
-
(1999)
Server Storage and RAID Worldwide
-
-
-
18
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
Ge, T., Zdonik, S.B.: Answering aggregation queries in a secure system model. In: Very Large Databases (VLDB), pp. 519-530 (2007)
-
(2007)
Very Large Databases (VLDB)
, pp. 519-530
-
-
Ge, T.1
Zdonik, S.B.2
-
19
-
-
0033895101
-
PicToSeek: Combining color and shape invariant features for image retrieval
-
DOI 10.1109/83.817602
-
Gevers, T., Smeulders, A.W.M.: PicToSeek: Combining Color and Shape Invariant Features for Image Retrieval. IEEE Trans. on Image Processing 9(1), 102-119 (2000) (Pubitemid 30562088)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.1
, pp. 102-119
-
-
Gevers, T.1
Smeulders, A.W.M.2
-
20
-
-
33244488406
-
-
Cryptology ePrint Archive, Report 2003/216
-
Goh, E.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
-
(2003)
Secure Indexes
-
-
Goh, E.1
-
22
-
-
33745120364
-
Secure Conjunctive Keyword Search over Encrypted Data
-
Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
-
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004) (Pubitemid 38846729)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
23
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM Press, New York
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD international conference on Management of data, pp. 216-227. ACM Press, New York (2002)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
26
-
-
10944264913
-
User Authentication in Multidatabase Systems
-
Hildebrandt, E., Saake, G.: User Authentication in Multidatabase Systems. In: Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, (August 26-28, 1998)
-
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, (August 26-28, 1998)
-
-
Hildebrandt, E.1
Saake, G.2
-
28
-
-
0030677524
-
A logical language for expressing authorizations
-
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. IEEE S&P, 31-42 (1997)
-
(1997)
IEEE S&P
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
29
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. In: SIGMOD (1997)
-
SIGMOD (1997)
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
30
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.J.: Limiting disclosure in hippocratic databases. In: Proceedings of VLDB, pp. 108-119 (2004)
-
(2004)
Proceedings of VLDB
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
31
-
-
0000653210
-
Selecting cryptographic key sizes
-
Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptology 14(4), 255-293 (2001)
-
(2001)
J. Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
32
-
-
78649827621
-
Grosof: A logic-based knowledge representation for authorization with delegation
-
Li, Feigenbaum, Grosof: A logic-based knowledge representation for authorization with delegation. In: PCSFW: Proceedings of the 12th CSFW (1999)
-
PCSFW: Proceedings of the 12th CSFW (1999)
-
-
Li, F.1
-
34
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Mykletun, E., Narasimha, M., Tsudik, G.: Signature Bouquets: Immutability for Aggregated/Condensed Signatures. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 160-176. Springer, Heidelberg (2004) (Pubitemid 39738739)
-
(2004)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3193
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
36
-
-
0010573970
-
Access rights administration in role-based security systems
-
Nyanchama, M., Osborn, S.L.: Access rights administration in role-based security systems. In: Proceedings of the IFIP DBSec, pp. 37-56 (1994)
-
(1994)
Proceedings of the IFIP DBSec
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.L.2
-
37
-
-
84882787643
-
Database security integration using role-based access control
-
Osborn, S.L.: Database security integration using role-based access control. In: Proceedings of the IFIP DBSec, pp. 245-258 (2000)
-
(2000)
Proceedings of the IFIP DBSec
, pp. 245-258
-
-
Osborn, S.L.1
-
38
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223
-
-
Paillier, P.1
-
40
-
-
0027928797
-
On five definitions of data integrity
-
Sandhu, R.S.: On five definitions of data integrity. In: Proceedings of the IFIP DBSec, pp. 257-267 (1993)
-
(1993)
Proceedings of the IFIP DBSec
, pp. 257-267
-
-
Sandhu, R.S.1
|