-
2
-
-
84886308792
-
Recent Advances in Access Control
-
M. Gertz and S. Jajodia, Springer
-
S. De Capitani di Vimercati, S. Foresti and P. Samarati, "Recent Advances in Access Control,"in Handbook of database security: applications and trends, M. Gertz and S. Jajodia, Springer, 2008, pp. 1-26
-
(2008)
Handbook of Database Security: Applications and Trends
, pp. 1-26
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
3
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," IEEEComputer, Vol.29, Num.2, February 1996,pp. 38-47
-
(1996)
IEEEComputer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
5
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbms
-
ACM
-
E. Damiani, S. De Capitani Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing confidentiality and efficiency in untrusted relational dbms," Proceedings of the 10th ACM conference on Computer and communications security, ACM, 2003, pp. 93-102
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 93-102
-
-
Damiani, E.1
De Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
73349112862
-
Database encryption: An overview of contemporary challenges and design considerations
-
E. Shmueli, R. Vaisenberg, Y. Elovici, C. Glezer, "Database encryption: an overview of contemporary challenges and design considerations,"SIGMOD Record 38(3), 2009, pp. 29-34
-
(2009)
SIGMOD Record
, vol.38
, Issue.3
, pp. 29-34
-
-
Shmueli, E.1
Vaisenberg, R.2
Elovici, Y.3
Glezer, C.4
-
9
-
-
84947663114
-
Main Memory Database Systems: An Overview
-
H. Garcia-Molina, K. Salem, "Main Memory Database Systems: An Overview," IEEE Trans. Knowl. Data Eng. 4(6), 1992, pp. 509-516
-
(1992)
IEEE Trans. Knowl. Data Eng.
, vol.4
, Issue.6
, pp. 509-516
-
-
Garcia-Molina, H.1
Salem, K.2
-
10
-
-
33244469997
-
Key management for multi-user encrypted databases
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Key management for multi-user encrypted databases," StorageSS, 2005, pp. 74-83
-
(2005)
StorageSS
, pp. 74-83
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
58349086247
-
Generalized Identity Based and Broadcast Encryption Schemes
-
D. Boneh and M. Hamburg, "Generalized Identity Based and Broadcast Encryption Schemes," ASIACRYPT, 2008, pp. 455-470
-
(2008)
ASIACRYPT
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
12
-
-
49049111604
-
Bounded Ciphertext Policy Attribute Based Encryption
-
V. Goyal, A. Jain, O. Pandey and A. Sahai, "Bounded Ciphertext Policy Attribute Based Encryption," ICALP, 2008, pp. 579-591
-
(2008)
ICALP
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
13
-
-
84979291225
-
Broadcast Encryption
-
A. Fiat and M. Naor, "Broadcast Encryption," CRYPTO, 1993, pp. 480-491
-
(1993)
CRYPTO
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
80455159880
-
-
http://it.toolbox.com/wiki/index.php/In-Memory-Database
-
-
-
|