-
1
-
-
33749642794
-
Sovereign joins
-
Atlanta, GA, USA, April
-
R. Agrawal, D. Asonov, M. Kantarcioglu and Y. Li, Sovereign joins, in: Proc. of the 22nd International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA, April 2006.
-
(2006)
Proc. of the 22nd International Conference on Data Engineering (ICDE 2006)
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
2
-
-
0018517077
-
The theory of joins in relational databases
-
A.V. Aho, C. Beeri and J.D. Ullman, The theory of joins in relational databases, ACM Transaction on Database Systems 4(3) (1979), 297-314.
-
(1979)
ACM Transaction on Database Systems
, vol.4
, Issue.3
, pp. 297-314
-
-
Aho, A.V.1
Beeri, C.2
Ullman, J.D.3
-
3
-
-
0019703516
-
Query processing in a system for distributed databases (SDD-1)
-
DOI 10.1145/319628.319650
-
P.A. Bernstein, N. Goodman, E.Wong, C.L. Reeve and J.B. Rothnie Jr., Query processing in a system for distributed databases (SDD-1), ACM Transaction on Database Systems 6(4) (1981), 602-625. (Pubitemid 12503981)
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.4
, pp. 602-625
-
-
Bernstein, P.A.1
Goodman, N.2
Wong, E.3
Reeve, C.L.4
Rothnie Jr., J.B.5
-
7
-
-
85048458862
-
A methodology for interpreting tree queries into optimal semi-join expressions
-
Santa Monica, CA, USA, May
-
D.M. Chiu and Y.C. Ho, A methodology for interpreting tree queries into optimal semi-join expressions, in: Proc. of the 1980 ACM SIGMOD International Conference on Management of Data (SIGMOD 1980), Santa Monica, CA, USA, May 1980.
-
(1980)
Proc. of the 1980 ACM SIGMOD International Conference on Management of Data (SIGMOD 1980)
-
-
Chiu, D.M.1
Ho, Y.C.2
-
8
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Anaheim, CA, USA, December 8-12
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi and F. Scotti, Privacy-aware biometrics: design and implementation of a multimodal verification system, in: Proc. of the Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA, December 8-12, 2008.
-
(2008)
Proc. of the Computer Security Applications Conference (ACSAC 2008)
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
9
-
-
0024715262
-
On optimal site assignment for relations in the distributed database environment
-
D.W. Cornell and P.S. Yu, On optimal site assignment for relations in the distributed database environment, IEEE Transactions on Software Engineering 15(8) (1989), 1004-1009.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 1004-1009
-
-
Cornell, D.W.1
Yu, P.S.2
-
10
-
-
0033884687
-
Providing security and interoperation of heterogeneous systems
-
DOI 10.1023/A:1008787317852
-
S. Dawson, S. Qian and P. Samarati, Providing security and interoperation of heterogeneous systems, Distributed and Parallel Databases 8(1) (2000), 119-145. (Pubitemid 30572228)
-
(2000)
Distributed and Parallel Databases
, vol.8
, Issue.1
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
11
-
-
51849155423
-
Controlled information sharing in collaborative distributed query processing
-
Beijing, China, June
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Controlled information sharing in collaborative distributed query processing, in: Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 2008.
-
(2008)
Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
70349300098
-
Assessing query privileges via safe and efficient permission composition
-
Alexandria, VA, USA, October
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Assessing query privileges via safe and efficient permission composition, in: Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, VA, USA, October 2008.
-
(2008)
Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
33244457952
-
Rewriting queries using views with access patterns under integrity constraints
-
Edinburgh, Scotland, January
-
A. Deutsch, B. Ludäscher and A. Nash, Rewriting queries using views with access patterns under integrity constraints, in: Proc. of the 10th International Conference on Database Theory (ICDT 2005), Edinburgh, Scotland, January 2005.
-
(2005)
Proc. of the 10th International Conference on Database Theory (ICDT 2005)
-
-
Deutsch, A.1
Ludäscher, B.2
Nash, A.3
-
15
-
-
0345870313
-
Query optimization in the presence of limited access patterns
-
Philadelphia, PA, USA, June
-
D. Florescu, A.Y. Levy, I. Manolescu and D. Suciu, Query optimization in the presence of limited access patterns, in: Proc. of the 1999 ACM SIGMOD International Conference on Management of Data (SIGMOD 1999), Philadelphia, PA, USA, June 1999.
-
(1999)
Proc. of the 1999 ACM SIGMOD International Conference on Management of Data (SIGMOD 1999)
-
-
Florescu, D.1
Levy, A.Y.2
Manolescu, I.3
Suciu, D.4
-
16
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy, May 5
-
M. Gamassi, V. Piuri, D. Sana and F. Scotti, Robust fingerprint detection for access control, in: Proc. of the 2nd RoboCare Workshop, Rome, Italy, May 5, 2005.
-
(2005)
Proc. of the 2nd RoboCare Workshop
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
17
-
-
33947309918
-
Data exchange: Computing cores in polynomial time
-
Chicago, IL, USA, June
-
G. Gottlob and A. Nash, Data exchange: Computing cores in polynomial time, in: Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2006), Chicago, IL, USA, June 2006.
-
(2006)
Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2006)
-
-
Gottlob, G.1
Nash, A.2
-
18
-
-
79960798029
-
Transaction optimization techniques
-
S. Jajodia and L. Kerchberg, eds, Kluwer, Boston, MA
-
A. Helal, Y.-S. Kim, M.H. Nodine, A.K. Elmagarmid and A.A. Heddaya, Transaction optimization techniques, in: Advanced Transaction Models and Architectures, S. Jajodia and L. Kerchberg, eds, Kluwer, Boston, MA, 1997.
-
(1997)
Advanced Transaction Models and Architectures
-
-
Helal, A.1
Kim, Y.-S.2
Nodine, M.H.3
Elmagarmid, A.K.4
Heddaya, A.A.5
-
19
-
-
0000500922
-
The state of the art in distributed query processing
-
D. Kossmann, The state of the art in distributed query processing, ACM Computing Surveys 32(4) (2000), 422-469.
-
(2000)
ACM Computing Surveys
, vol.32
, Issue.4
, pp. 422-469
-
-
Kossmann, D.1
-
20
-
-
0142231580
-
Computing complete answers to queries in the presence of limited access patterns
-
DOI 10.1007/s00778-002-0085-6
-
C. Li, Computing complete answers to queries in the presence of limited access patterns, VLDB Journal 12(3) (2003), 211-227. (Pubitemid 37326596)
-
(2003)
VLDB Journal
, vol.12
, Issue.3
, pp. 211-227
-
-
Li, C.1
-
21
-
-
0021555056
-
Optimization of nested queries in a distributed relational database
-
Singapore, August
-
G.M. Lohman, D. Daniels, L.M. Haas, R. Kistler and P.G. Selinger, Optimization of nested queries in a distributed relational database, in: Proc. of the 10th International Conference on Very Large Data Bases (VLDB 1984), Singapore, August 1984.
-
(1984)
Proc. of the 10th International Conference on Very Large Data Bases (VLDB 1984)
-
-
Lohman, G.M.1
Daniels, D.2
Haas, L.M.3
Kistler, R.4
Selinger, P.G.5
-
22
-
-
34247379108
-
Privacy-preserving semantic interoperation and access control of heterogeneous databases
-
Taipei, Taiwan, March
-
P. Mitra, C. Pan, P. Liu and V. Atluri, Privacy-preserving semantic interoperation and access control of heterogeneous databases, in: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan, March 2006.
-
(2006)
Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006)
-
-
Mitra, P.1
Pan, C.2
Liu, P.3
Atluri, V.4
-
24
-
-
0037848141
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, eds, LNCS, Springer, Berlin
-
P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, LNCS, Vol. 2171, Springer, Berlin, 2001.
-
(2001)
Foundations of Security Analysis and Design
, vol.2171
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
25
-
-
85051567368
-
Access path selection in a relational database management system
-
Boston, MA, USA, May-June
-
P.G. Selinger, M.M. Astrahan, D.D. Chamberlin, R.A. Lorie and T.G. Price, Access path selection in a relational database management system, in: Proc. of the 1979 ACM SIGMOD International Conference on Management of Data (SIGMOD 1979), Boston, MA, USA, May-June 1979.
-
(1979)
Proc. of the 1979 ACM SIGMOD International Conference on Management of Data (SIGMOD 1979)
-
-
Selinger, P.G.1
Astrahan, M.M.2
Chamberlin, D.D.3
Lorie, R.A.4
Price, T.G.5
-
26
-
-
33746779159
-
A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions
-
Storrs, CT, USA, August
-
J. Warner, V. Atluri and R. Mukkamala, A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions, in: Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2005), Storrs, CT, USA, August 2005.
-
(2005)
Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2005)
-
-
Warner, J.1
Atluri, V.2
Mukkamala, R.3
-
27
-
-
0021629176
-
Distributed query processing
-
C.T. Yu and C.C. Chang, Distributed query processing, ACM Computing Surveys 16(4) (1984), 399-433.
-
(1984)
ACM Computing Surveys
, vol.16
, Issue.4
, pp. 399-433
-
-
Yu, C.T.1
Chang, C.C.2
|