-
2
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40, 666-682 (2001)
-
(2001)
IBM Syst. J.
, vol.40
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
3
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS (1995)
-
(1995)
FOCS
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
4
-
-
33847753565
-
The transport layer security (tls) protocol
-
version 1.2 August
-
Dierks, T., Rescorla, E.: Rfc 5246: The transport layer security (tls) protocol version 1.2 (August 2008)
-
(2008)
Rfc
, vol.5246
-
-
Dierks, T.1
Rescorla, E.2
-
5
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
7
-
-
85165849639
-
-
Technical Report TR-11-179, University of Pittsburgh, Dept. of Computer Science
-
Farnan, N.L., Lee, A.J., Chrysanthis, P.K., Yu, T.: Dont reveal my intension: Protecting user privacy using declarative preferences during distributed query processing. Technical Report TR-11-179, University of Pittsburgh, Dept. of Computer Science (2011)
-
(2011)
Dont Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing
-
-
Farnan, N.L.1
Lee, A.J.2
Chrysanthis, P.K.3
Yu, T.4
-
8
-
-
85165849068
-
Investigating privacy-aware distributed query evaluation
-
Farnan, N.L., Lee, A.J., Yu, T.: Investigating privacy-aware distributed query evaluation. In: WPES (2010)
-
(2010)
WPES
-
-
Farnan, N.L.1
Lee, A.J.2
Yu, T.3
-
10
-
-
0030156976
-
Performance tradeoffs for clientserver query processing
-
Franklin, M.J., Jónsson, B.T., Kossmann, D.: Performance tradeoffs for clientserver query processing. SIGMOD Rec. 25, 149-160 (1996)
-
(1996)
SIGMOD Rec.
, vol.25
, pp. 149-160
-
-
Franklin, M.J.1
Jónsson, B.T.2
Kossmann, D.3
-
12
-
-
4043126187
-
Foundations of preferences in database systems
-
Kießling, W.: Foundations of preferences in database systems. In: VLDB (2002)
-
(2002)
VLDB
-
-
Kießling, W.1
-
13
-
-
9444283188
-
Preference sql: Design, implementation, experiences
-
Kießling, W., Köstler, G.: Preference sql: design, implementation, experiences. In: VLDB (2002)
-
(2002)
VLDB
-
-
Kießling, W.1
Köstler, G.2
-
15
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS (1997)
-
(1997)
FOCS
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
16
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and l-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE (2007)
-
(2007)
ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
17
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM TKDD 1(1), 3 (2007)
-
(2007)
ACM TKDD
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
18
-
-
55849130742
-
High-speed private information retrieval computation on gpu
-
Melchor, C.A., Crespin, B., Gaborit, P., Jolivet, V., Rousseau, P.: High-speed private information retrieval computation on gpu. In: SECURWARE (2008)
-
(2008)
SECURWARE
-
-
Melchor, C.A.1
Crespin, B.2
Gaborit, P.3
Jolivet, V.4
Rousseau, P.5
-
19
-
-
33749069296
-
-
National Computer Security Center (NCSC) October
-
National Computer Security Center (NCSC). Glossary of Computer Security Terms (ncsc-tg-04) (October 1988), http://csrc.nist.gov/publications/secpubs/ rainbow/tg004.txt
-
(1988)
Glossary of Computer Security Terms (Ncsc-tg-04)
-
-
-
20
-
-
77955434225
-
Privacy-preserving queries over relational databases
-
Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
-
Olumofin, F.G., Goldberg, I.: Privacy-preserving queries over relational databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75-92. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6205
, pp. 75-92
-
-
Olumofin, F.G.1
Goldberg, I.2
-
21
-
-
9444288596
-
Distributed query processing and catalogs for peer-to-peer systems
-
Papadimos, V., Maier, D., Tufte, K.: Distributed query processing and catalogs for peer-to-peer systems. In: CIDR (2003)
-
(2003)
CIDR
-
-
Papadimos, V.1
Maier, D.2
Tufte, K.3
-
22
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE TKDE 13, 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, pp. 1010-1027
-
-
Samarati, P.1
-
23
-
-
70349125738
-
On the practicality of private information retrieval
-
Sion, R., Carbunar, B.: On the practicality of private information retrieval. In: NDSS (2007)
-
(2007)
NDSS
-
-
Sion, R.1
Carbunar, B.2
-
25
-
-
20444479906
-
A logic-based framework for attribute based access control
-
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE (2004)
-
(2004)
FMSE
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
|