메뉴 건너뛰기




Volumn 3, Issue 1, 2010, Pages 13-24

Building disclosure risk aware query optimizers for relational databases

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; MALWARE; QUERY PROCESSING; RELATIONAL DATABASE SYSTEMS; SECURITY OF DATA; VIRTUAL STORAGE;

EID: 84856902066     PISSN: None     EISSN: 21508097     Source Type: Conference Proceeding    
DOI: 10.14778/1920841.1920849     Document Type: Article
Times cited : (12)

References (17)
  • 5
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • S. Haber and W. S. Stornetta. How to time-stamp a digital document. J. Cryptology, 3(2):99-111, 1991.
    • (1991) J. Cryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber, S.1    Stornetta, W.S.2
  • 9
  • 12
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159-176, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 17
    • 84976777554 scopus 로고
    • Approximating block accesses in database organizations
    • S. B. Yao. Approximating block accesses in database organizations. Commun. ACM, 20(4):260-261, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.4 , pp. 260-261
    • Yao, S.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.