-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Asilomar, CA, USA, January
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas and Y. Xu, Two can keep a secret: a distributed architecture for secure database services, in: Proc. of CIDR 2005, Asilomar, CA, USA, January 2005.
-
(2005)
Proc. of CIDR 2005
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
-
J. Biskup, D.W. Embley and J. Lochner, Reducing inference control to access control for normalized database schemas, Inform. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
3
-
-
85043086199
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
Valparaíso, Chile, October
-
J. Biskup and J. Lochner, Enforcing confidentiality in relational databases by reducing inference control to access control, in: Proc. of ISC 2007, Valparaíso, Chile, October 2007.
-
(2007)
Proc. of ISC 2007
-
-
Biskup, J.1
Lochner, J.2
-
4
-
-
84872238800
-
On the Inference-proofness of Database Fragmentation Satisfying Confidentiality Constraints
-
Xi'an, China, October
-
J. Biskup, M. Preuß and L. Wiese, On the inference-proofness of database fragmentation satisfying confidentiality constraints, in: Proc. of ISC 2011, Xi'an, China, October 2011.
-
(2011)
Proc. of ISC 2011
-
-
Biskup, J.1
Preuß, M.2
Wiese, L.3
-
5
-
-
85043057475
-
Combining consistency and confidentiality requirements in first-order databases
-
Pisa, Italy, September
-
J. Biskup and L. Wiese, Combining consistency and confidentiality requirements in first-order databases, in: Proc. of ISC 2009, Pisa, Italy, September 2009.
-
(2009)
Proc. of ISC 2009
-
-
Biskup, J.1
Wiese, L.2
-
6
-
-
79958038774
-
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
-
J. Biskup and L. Wiese, A sound and complete model-generation procedure for consistent and confidentiality-preserving databases, Theoret. Comput. Sci. 412(31) (2011), 4044-4072.
-
(2011)
Theoret. Comput. Sci.
, vol.412
, Issue.31
, pp. 4044-4072
-
-
Biskup, J.1
Wiese, L.2
-
7
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
R.E. Bryant, Graph-based algorithms for Boolean function manipulation, IEEE TC 35(8) (1986), 677-691.
-
(1986)
IEEE TC
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
8
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Anaheim, CA, USA, December
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi and F. Scotti, Privacy-aware biometrics: design and implementation of a multimodal verification system, in: Proc. of ACSAC 2008, Anaheim, CA, USA, December 2008.
-
(2008)
Proc. of ACSAC 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
9
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
Dresden, Germany, September
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Fragmentation and encryption to enforce privacy in data storage, in: Proc. of ESORICS 2007, Dresden, Germany, September 2007.
-
(2007)
Proc. of ESORICS 2007
-
-
Ciriani, V.1
De Vimercati Di Capitani, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
Montreal, Canada, June
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Fragmentation design for efficient query execution over sensitive distributed databases, in: Proc. of ICDCS 2009, Montreal, Canada, June 2009.
-
(2009)
Proc. of ICDCS 2009
-
-
Ciriani, V.1
De Vimercati Di Capitani, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
Saint Malo, France, September
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Keep a few: outsourcing data while maintaining confidentiality, in: Proc. of ESORICS 2009, Saint Malo, France, September 2009.
-
(2009)
Proc. of ESORICS 2009
-
-
Ciriani, V.1
De Vimercati Di Capitani, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Combining fragmentation and encryption to protect privacy in data storage, ACM TISSEC 13(3) (2010), 2211-2233.
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
, pp. 2211-2233
-
-
Ciriani, V.1
De Vimercati Di Capitani, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
13
-
-
79960261056
-
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach
-
Richmond, VA, USA, July
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga and P. Samarati, Enforcing confidentiality and data visibility constraints: an OBDD approach, in: Proc. of DBSec 2011, Richmond, VA, USA, July 2011.
-
(2011)
Proc. of DBSec 2011
-
-
Ciriani, V.1
De Vimercati Di Capitani, S.2
Foresti, S.3
Livraga, G.4
Samarati, P.5
-
14
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, October
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, in: Proc. of CCS 2003, Washington, DC, USA, October 2003.
-
(2003)
Proc. of CCS 2003
-
-
Damiani, E.1
De Vimercati Di Capitani, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Fragments and loose associations: Respecting privacy in data publishing, Proc. VLDB Endowment 3(1) (2010), 1370-1381.
-
(2010)
Proc. VLDB Endowment
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Vimercati Di Capitani, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
16
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy, May
-
M. Gamassi, V. Piuri, D. Sana and F. Scotti, Robust fingerprint detection for access control, in: Proc. of RoboCare 2005, Rome, Italy, May 2005.
-
(2005)
Proc. of RoboCare 2005
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
17
-
-
77955452167
-
Fast set bounds propagation using a BDD-SAT hybrid
-
G. Gange, P.J. Stuckey and V. Lagoon, Fast set bounds propagation using a BDD-SAT hybrid, Int. J. Artif. Intell. 38(1) (2010), 307-338.
-
(2010)
Int. J. Artif. Intell.
, vol.38
, Issue.1
, pp. 307-338
-
-
Gange, G.1
Stuckey, P.J.2
Lagoon, V.3
-
18
-
-
0036204131
-
Providing database as a service
-
San Jose, CA, USA, February
-
H. Hacigümüs, B. Iyer and S. Mehrotra, Providing database as a service, in: Proc. of ICDE 2002, San Jose, CA, USA, February 2002.
-
(2002)
Proc. of ICDE 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
19
-
-
57649168881
-
On automata, MDDs and BDDs in constraint satisfaction
-
Patras, Greece, July
-
T. Hadzic, E.R. Hansen and B. O'Sullivan, On automata, MDDs and BDDs in constraint satisfaction, in: Proc. of ECAI 2008, Patras, Greece, July 2008.
-
(2008)
Proc. of ECAI 2008
-
-
Hadzic, T.1
Hansen, E.R.2
O'Sullivan, B.3
-
20
-
-
46949108847
-
-
Addison-Wesley, Reading, MA
-
D.E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams, Addison-Wesley, Reading, MA, 2009.
-
(2009)
The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams
-
-
Knuth, D.E.1
-
21
-
-
9444258628
-
Efficient BDD encodings for partial order constraints with application to expert systems in software verification
-
Innovations in Applied Artificial Intelligence
-
M. Kurihara and H. Kondo, Efficient BDD encodings for partial order constraints with application to expert systems in software verification, in: Innovations in Applied Artificial Intelligence, B. Orchard, C. Yang and M. Ali, eds, Springer, Berlin, 2004, pp. 827-837. (Pubitemid 38761288)
-
(2004)
Lecture Notes In Computer Science
, Issue.3029
, pp. 827-837
-
-
Kurihara, M.1
Kondo, H.2
-
24
-
-
84976839448
-
Vertical partitioning for database design: A graphical algorithm
-
Portland, OR, USA, June
-
S. Navathe and M. Ra, Vertical partitioning for database design: a graphical algorithm, in: Proc. of SIGMOD 1989, Portland, OR, USA, June 1989.
-
(1989)
Proc. of SIGMOD 1989
-
-
Navathe, S.1
Ra, M.2
-
25
-
-
1342295659
-
A New Algorithm for the Maximum-weight Clique Problem
-
P.R.J. Östergård, A new algorithm for the maximum-weight clique problem, Nordic J. Comput. 8(4) (2001), 424-436.
-
(2001)
Nordic J. Comput.
, vol.8
, Issue.4
, pp. 424-436
-
-
Östergård, P.R.J.1
-
26
-
-
84867997005
-
A Fast Algorithm for the Maximum Clique Problem
-
P.R.J. Östergård, A fast algorithm for the maximum clique problem, Discrete Appl. Math. 120(1-3) (2002), 197-207.
-
(2002)
Discrete Appl. Math.
, vol.120
, Issue.1-3
, pp. 197-207
-
-
Östergård, P.R.J.1
-
27
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, Protecting respondents' identities in microdata release, IEEE TKDE 13(6) (2001), 1010-1027. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
28
-
-
77954461010
-
Data Protection in Outsourcing Scenarios: Issues and Directions
-
Beijing, China, April 2010 (Invited paper)
-
P. Samarati and S. De Capitani di Vimercati, Data protection in outsourcing scenarios: issues and directions, in: Proc. of the ASIACCS 2010, Beijing, China, April 2010 (Invited paper).
-
Proc. of the ASIACCS 2010
-
-
Samarati, P.1
De Vimercati Di Capitani, S.2
-
30
-
-
84872233418
-
An Index Structure for Private Data Outsourcing
-
Richmond, VA, USA, July
-
A. Steele and K.B. Frikken, An index structure for private data outsourcing, in: Proc. of DBSec 2011, Richmond, VA, USA, July 2011.
-
(2011)
Proc. of DBSec 2011
-
-
Steele, A.1
Frikken, K.B.2
-
31
-
-
85043060682
-
Horizontal Fragmentation for Data Outsourcing with Formula-based Confidentiality Constraints
-
Kobe, Japan, November
-
L. Wiese, Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints, in: Proc. of IWSEC 2010, Kobe, Japan, November 2010.
-
(2010)
Proc. of IWSEC 2010
-
-
Wiese, L.1
|