-
1
-
-
0003928313
-
-
Addison-Wesley, Reading
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: 2nd Biennial Conference on Innovative Data Systems Research, CIDR 2005, pp. 186-199 (2005)
-
(2005)
2nd Biennial Conference on Innovative Data Systems Research, CIDR 2005
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
4
-
-
77951549976
-
Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
-
Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. Springer, Heidelberg
-
Biskup, J.: Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. LNCS, vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
5
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artificial Intelligence 50(1-2), 39-77 (2007)
-
(2007)
Annals of Mathematics and Artificial Intelligence
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
Biskup, J., Embley, D.W., Lochner, J.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106(1), 8-12 (2008)
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.3
-
7
-
-
70350370035
-
Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients
-
Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol. 5645, pp. 225-239. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5645
, pp. 225-239
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 440-455
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security 13(3) (2010)
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
0020191157
-
Horn clauses and database dependencies
-
Fagin, R.: Horn clauses and database dependencies. Journal of the ACM 29(4), 952-985 (1982)
-
(1982)
Journal of the ACM
, vol.29
, Issue.4
, pp. 952-985
-
-
Fagin, R.1
-
12
-
-
0036204131
-
Providing database as a service
-
IEEE Computer Society, Los Alamitos
-
Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, ICDE 2002, pp. 29-40. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
Proceedings of the 18th International Conference on Data Engineering, ICDE 2002
, pp. 29-40
-
-
Hacigümüs, H.1
Mehrotra, S.2
Iyer, B.R.3
-
13
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Feng, D., Basin, D.A., Liu, P. (eds.) ACM, New York
-
Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Feng, D., Basin, D.A., Liu, P. (eds.) ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 1-14. ACM, New York (2010)
-
(2010)
ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010
, pp. 1-14
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
14
-
-
78649986957
-
Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
-
Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. Springer, Heidelberg
-
Wiese, L.: Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 101-116. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6434
, pp. 101-116
-
-
Wiese, L.1
|