메뉴 건너뛰기




Volumn , Issue , 2003, Pages 898-909

Controlling Access to Published Data Using Cryptography

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85128992094     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-012722442-8/50084-7     Document Type: Chapter
Times cited : (2)

References (34)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • Dec
    • N.R. Adam., J.C. Wortman Security-control methods for statistical databases ACM Computing Surveys 21 4 Dec. 1989 515-556.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 2
    • 0010254788 scopus 로고    scopus 로고
    • Fast Implementations of AES Candidates
    • NIST New York
    • K. Aoki., H. Lipmaa Fast Implementations of AES Candidates The 3rd AES Candidate Conference 2000 NIST New York 106-120.
    • (2000) The 3rd AES Candidate Conference , pp. 106-120
    • Aoki, K.1    Lipmaa, H.2
  • 4
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • J. Benaloh., J. Leichter Generalized secret sharing and monotone functions CRYPTO 1988 27-35.
    • (1988) CRYPTO , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 8
    • 85129110018 scopus 로고    scopus 로고
    • http://www.bouncycastle.org.
  • 11
    • 84954434858 scopus 로고    scopus 로고
    • The block cipher rijndael
    • J. Daemen., V. Rijmen The block cipher rijndael CARDIS 1998 277-284.
    • (1998) CARDIS , pp. 277-284
    • Daemen, J.1    Rijmen, V.2
  • 14
    • 4243056572 scopus 로고    scopus 로고
    • Containment and integrity constraints for xpath
    • A. Deutsch., V. Tannen Containment and integrity constraints for xpath KRDB 2001.
    • (2001) KRDB
    • Deutsch, A.1    Tannen, V.2
  • 18
    • 85128996259 scopus 로고    scopus 로고
    • http://www.fmridc.org/submissions/privacy_guidelines.html.
  • 22
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database service provider model
    • H. Hacigumus., B.R. Iyer., C. Li., S. Mehrotra Executing SQL over encrypted data in the database service provider model SIGMOD Conference 2002.
    • (2002) SIGMOD Conference
    • Hacigumus, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 24
    • 0033860985 scopus 로고    scopus 로고
    • Should the neuroscience community make a paradigm shift to sharing primary data?
    • September
    • S.H. Koslow Should the neuroscience community make a paradigm shift to sharing primary data? Nature Neuroscience 3 9 September 2000 863-865.
    • (2000) Nature Neuroscience , vol.3 , Issue.9 , pp. 863-865
    • Koslow, S.H.1
  • 27
    • 0033860984 scopus 로고    scopus 로고
    • A debate over fmri data sharing
    • Sep
    • Nature Neuroscience Editorial A debate over fmri data sharing Nature Neuroscience 3 9 Sep 2000 845-846.
    • (2000) Nature Neuroscience , vol.3 , Issue.9 , pp. 845-846
  • 29
    • 85129081223 scopus 로고    scopus 로고
    • http://grant.nih.gov/grants/policy/data_sharing/index.htm.
  • 30
    • 85128991816 scopus 로고    scopus 로고
    • OASIS. eXtensible Access Control Markup Language (XACML)
    • OASIS. eXtensible Access Control Markup Language (XACML) http://www.oasis-open.org/committees/xacml.
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret CACM 22 11 1979 612-613.
    • (1979) CACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.