-
1
-
-
33244467922
-
Security analysis of O'ryptographically controlled access to XML documents
-
M. Abadi et al., "Security Analysis of O'ryptographically Controlled Access to XML Documents,", PODS 2005.
-
(2005)
PODS
-
-
Abadi, M.1
-
2
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggrawal et al., "Two can Keep a Secret: A distributed Architecture for Secure Database Services,", CIDR 2005.
-
(2005)
CIDR
-
-
Aggrawal, G.1
-
3
-
-
66249092071
-
Order preserving encryption for numeric data
-
Ft. Agrawal et al., "Order Preserving Encryption for Numeric Data,", SIGMOD 2001.
-
(2001)
SIGMOD
-
-
Agrawal, F.T.1
-
4
-
-
0036209423
-
Structural joins: A primitive for efficient XML query pattern matching
-
S. Al-Khalifa et al., "Structural Joins: A Primitive for Efficient XML Query Pattern Matching,", ICDE 2002.
-
(2002)
ICDE
-
-
Al-Khalifa, S.1
-
5
-
-
0010254147
-
Practice-oriented provable-security
-
M. Bellare, "Practice-oriented provable-security,", ISW 1997.
-
(1997)
ISW
-
-
Bellare, M.1
-
6
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino et al., "Secure and selective dissemination of XML documents,", ACM Transactions on Information and System Security, 5(3), Page 290-331, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
-
10
-
-
0042710151
-
A modification of the greedy algorithm for vertex cover
-
K.L. Clarkson, "A modification of the greedy algorithm for vertex cover,", Information Processing Letters, 16 (1983), pp. 23-25.
-
(1983)
Information Processing Letters
, vol.16
, pp. 23-25
-
-
Clarkson, K.L.1
-
14
-
-
33745620195
-
The case for access control on XML relationships
-
B. Finance et al., "The Case for Access Control on XML Relationships,", CIKM, 2005.
-
(2005)
CIKM
-
-
Finance, B.1
-
16
-
-
3543133070
-
RDF metadata for XML access control
-
V. Gowadia et al., "RDF Metadata for XML Access Control,", ACM Workshop on Security, 2003.
-
(2003)
ACM Workshop on Security
-
-
Gowadia, V.1
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provided model
-
H. Hacigumus et al., "Executing SQL over Encrypted Data in the Database-Service-Provided Model,". SIGMOD 2002.
-
(2002)
SIGMOD
-
-
Hacigumus, H.1
-
18
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Bore et al., "A Privacy-Preserving Index for Range Queries,". VLDB 2004.
-
(2004)
VLDB
-
-
Bore, B.1
-
20
-
-
84883261388
-
Replication is not needed: Single database, computationally-private information retrieval
-
F. Kushilevitz et al., "Replication is not needed: Single Database, Computationally-Private Information Retrieval,", FOCS97.
-
FOCS97
-
-
Kushilevitz, F.1
-
21
-
-
84991002123
-
Secure and privacy preserving outsourcing of tree structured data
-
P. Lin et al., "Secure and Privacy Preserving Outsourcing of Tree Structured Data,", SDM 2004.
-
(2004)
SDM
-
-
Lin, P.1
-
22
-
-
84968422314
-
Bow to build a trusted database system on untrusted storage
-
U. Maheshwari et al., "Bow to Build a Trusted Database System on Untrusted Storage,", OSDI 2000.
-
(2000)
OSDI
-
-
Maheshwari, U.1
-
23
-
-
85009120801
-
Controlling access to published data using cryptography
-
J. Miklau et al. "Controlling Access to Published Data Using Cryptography,", VLDB 2003.
-
(2003)
VLDB
-
-
Miklau, J.1
-
24
-
-
84893852016
-
A formal analysis of information disclosure in data exchange
-
G. Miklau et al, "A Formal Analysis of Information Disclosure in Data Exchange,", SIGMOD 2001.
-
(2001)
SIGMOD
-
-
Miklau, G.1
|