-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR 2005, Asilomar, CA, USA (January 2005)
-
Proc. of CIDR 2005, Asilomar, CA, USA (January 2005)
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
70350414506
-
Combining consistency and confidentiality requirements in first-order databases
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Biskup, J., Wiese, L.: Combining consistency and confidentiality requirements in first-order databases. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 121-134. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 121-134
-
-
Biskup, J.1
Wiese, L.2
-
3
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
Bryant, R.: Graph-based algorithms for Boolean function manipulation. IEEE TC 35(8), 677-691 (1986)
-
(1986)
IEEE TC
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.1
-
4
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proc. of INFOCOM 2011, Shanghai, China (April 2011)
-
Proc. of INFOCOM 2011, Shanghai, China (April 2011)
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
5
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
6
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of ICDCS 2009, Montreal, Canada (June 2009)
-
Proc. of ICDCS 2009, Montreal, Canada (June 2009)
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 440-455
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. Proc. of the VLDB Endowment 3(1), 1370-1381 (2010)
-
(2010)
Proc. of the VLDB Endowment
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
4644223618
-
Accuracy and performance of biometric systems
-
Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proc. of IMTC 2004, Como, Italy (May 2004)
-
Proc. of IMTC 2004, Como, Italy (May 2004)
-
-
Gamassi, M.1
Lazzaroni, M.2
Misino, M.3
Piuri, V.4
Sana, D.5
Scotti, F.6
-
12
-
-
84927600695
-
Robust fingerprint detection for access control
-
Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)
-
Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
13
-
-
77955452167
-
Fast set bounds propagation using a bdd-sat hybrid
-
Gange, G., Stuckey, P.J., Lagoon, V.: Fast set bounds propagation using a bdd-sat hybrid. J. Artif. Int. Res. 38, 307-338 (2010)
-
(2010)
J. Artif. Int. Res.
, vol.38
, pp. 307-338
-
-
Gange, G.1
Stuckey, P.J.2
Lagoon, V.3
-
14
-
-
0036204131
-
Providing database as a service
-
Hacigümüs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002, San Jose, CA, USA (February 2002)
-
Proc. of ICDE 2002, San Jose, CA, USA (February 2002)
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
15
-
-
79960227125
-
On automata, MDDs and BDDs in constraint satisfaction
-
Hadzic, T., Hansen, E.R., O'Sullivan, B.: On automata, MDDs and BDDs in constraint satisfaction. In: Proc. of ECAI 2008, Patras, Greece (July 2008)
-
Proc. of ECAI 2008, Patras, Greece (July 2008)
-
-
Hadzic, T.1
Hansen, E.R.2
O'Sullivan, B.3
-
17
-
-
9444258628
-
Efficient BDD encodings for partial order constraints with application to expert systems in software verification
-
Orchard, B., Yang, C., Ali, M. (eds.) Springer, Heidelberg
-
Kurihara, M., Kondo, H.: Efficient BDD encodings for partial order constraints with application to expert systems in software verification. In: Orchard, B., Yang, C., Ali, M. (eds.) Innovations in Applied Artificial Intelligence. Springer, Heidelberg (2004)
-
(2004)
Innovations in Applied Artificial Intelligence
-
-
Kurihara, M.1
Kondo, H.2
-
19
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
21
-
-
78649986957
-
Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
-
Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. Springer, Heidelberg
-
Wiese, L.: Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 101-116. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6434
, pp. 101-116
-
-
Wiese, L.1
|