-
1
-
-
35448952234
-
Ghostdb: querying visible and hidden data without leaks
-
New York, NY, USA, ACM
-
N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha. Ghostdb: querying visible and hidden data without leaks. In SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 677-688, New York, NY, USA, 2007. ACM.
-
(2007)
In SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data
, pp. 677-688
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Pucheral, P.4
Shasha, D.5
-
3
-
-
84889030419
-
Shredding your garbage: reducing data lifetime through secure deallocation
-
Berkeley, CA, USA, USENIX Association
-
J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding your garbage: reducing data lifetime through secure deallocation. In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pages 22-22, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium
, pp. 22-22
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
5
-
-
0025849585
-
How to time-stamp a digital document
-
S. Haber and W. S. Stornetta. How to time-stamp a digital document. J. Cryptology, 3(2):99-111, 1991.
-
(1991)
J. Cryptology
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
6
-
-
66149173689
-
Lest we remember: cold-boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM, 52(5):91-98, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
7
-
-
84859242669
-
-
In International Conference on Extending Database Technology (EDBT 2004)
-
B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in rdbms. In International Conference on Extending Database Technology (EDBT 2004), 2004.
-
(2004)
A framework for efficient storage security in rdbms
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
8
-
-
33847371627
-
Pareto multi objective optimization
-
Proceedings of the 13th International Conference on
-
P. Ngatchou, A. Zarei, and M. El-Sharkawi. Pareto multi objective optimization. In Intelligent Systems Application to Power Systems, 2005. Proceedings of the 13th International Conference on, pages 84-91, Nov. 2005.
-
(2005)
In Intelligent Systems Application to Power Systems, 2005
, pp. 84-91
-
-
Ngatchou, P.1
Zarei, A.2
El-Sharkawi, M.3
-
12
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159-176, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
14
-
-
35448997405
-
Threats to privacy in the forensic analysis of database systems
-
New York, NY, USA, ACM
-
P. Stahlberg, G. Miklau, and B. N. Levine. Threats to privacy in the forensic analysis of database systems. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 91-102, New York, NY, USA, 2007. ACM.
-
(2007)
In Proceedings of the 2007 ACM SIGMOD international conference on Management of data
, pp. 91-102
-
-
Stahlberg, P.1
Miklau, G.2
Levine, B.N.3
-
17
-
-
84976777554
-
Approximating block accesses in database organizations
-
S. B. Yao. Approximating block accesses in database organizations. Commun. ACM, 20(4):260-261, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.4
, pp. 260-261
-
-
Yao, S.B.1
|