-
1
-
-
0024914229
-
Security-Control Methods for Statistical Databases: A Comparative Study
-
Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys 21(4): 515-556 (1989)
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
Blum, M., Micali, S., "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", SIAM Journal on Computing, 13 (1984), 850-864.
-
(1984)
SIAM Journal On Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hakan Hacigumus, Balakrishna R. Iyer, Chen Li, Sharad Mehrotra: Executing SQL over encrypted data in the database-service-provider model. ACM SIGMOD Conference 2002: 216-227
-
(2002)
ACM SIGMOD Conference
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
5
-
-
0034951888
-
Multilevel Security Transaction Processing
-
Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 165-195
-
-
Jajodia, S.1
Atluri, V.2
Keefe, T.F.3
McCollum, C.D.4
Mukkamala, R.5
-
8
-
-
0004192381
-
-
CRC Press, Boca Raton
-
Menezes, A.J, van Oorschot, P.C. and Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997, page 239.
-
(1997)
Handbook of Applied Cryptography
, pp. 239
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
9
-
-
0026122066
-
What Every Computer Scientist Should Know About Floating Point Arithmetic
-
available at
-
Goldberg, D., "What Every Computer Scientist Should Know About Floating Point Arithmetic", ACM Computing Surveys, 1991, available at http://citeseer.nj.nec.com/goldberg91what.html
-
(1991)
ACM Computing Surveys
-
-
Goldberg, D.1
-
10
-
-
84902494831
-
-
Tech. Report, EECS, CWRU
-
Ozsoyoglu, G., Singer, D., Chung, S., "Querying Encrypted Databases", Tech. Report, EECS, CWRU.
-
Querying Encrypted Databases
-
-
Ozsoyoglu, G.1
Singer, D.2
Chung, S.3
-
11
-
-
0031097770
-
A Semantic Framework of the Multilevel Secure Relational Model
-
Xiaolei Qian, Teresa F. Lunt: A Semantic Framework of the Multilevel Secure Relational Model. IEEE TKDE 9(2): 292-301 (1997)
-
(1997)
IEEE TKDE
, vol.9
, Issue.2
, pp. 292-301
-
-
Qian, X.1
Lunt, T.F.2
-
12
-
-
0005301490
-
On data banks and privacy homomorphisms
-
in R. A. DeMillo et al., eds, Academic Press, New York
-
R. L. Rivest, L. Adleman and M.L. Dertouzos, On data banks and privacy homomorphisms, in R. A. DeMillo et al., eds., Foundations of Secure Computation, Academic Press, New York, 1978, 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
14
-
-
0001405255
-
Sql: 1999, formerly known as sql 3
-
Eisengerg, A., Melton, J., "Sql: 1999, formerly known as sql 3", ACM SIGMOD Record, 28(1), 131-138, 1999.
-
(1999)
ACM SIGMOD Record
, vol.28
, Issue.1
, pp. 131-138
-
-
Eisengerg, A.1
Melton, J.2
|