The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2007 (conf/dbsec/2007)

  1. Joachim Biskup, Torben Weibert
    Confidentiality Policies for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:1-13 [Conf]
  2. Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill
    Provably-Secure Schemes for Basic Query Support in Outsourced Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:14-30 [Conf]
  3. Giuseppe Di Battista, Bernardo Palazzi
    Authenticated Relational Tables and Authenticated Skip Lists. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:31-46 [Conf]
  4. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Location Privacy Protection Through Obfuscation-Based Techniques. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:47-60 [Conf]
  5. Vijayalakshmi Atluri, Heechang Shin
    Efficient Security Policy Enforcement in a Location Based Service Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:61-76 [Conf]
  6. Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray
    Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:77-92 [Conf]
  7. Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
    Privacy-Preserving Schema Matching Using Mutual Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:93-94 [Conf]
  8. Anna Zych, Milan Petkovic, Willem Jonker
    The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:95-97 [Conf]
  9. Lingyu Wang, Anoop Singhal, Sushil Jajodia
    Measuring the Overall Security of Network Configurations Using Attack Graphs. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:98-112 [Conf]
  10. Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham
    Enforcing Honesty in Assured Information Sharing Within a Distributed System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:113-128 [Conf]
  11. Jan Kolter, Rolf Schillinger, Günther Pernul
    A Privacy-Enhanced Attribute-Based Access Control System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:129-143 [Conf]
  12. Shouhuai Xu, Ravi S. Sandhu
    A Scalable and Secure Cryptographic Service. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:144-160 [Conf]
  13. Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
    gVault: A Gmail Based Cryptographic Network File System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:161-176 [Conf]
  14. Mustafa Canim, Murat Kantarcioglu
    Design and Analysis of Querying Encrypted Data in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:177-194 [Conf]
  15. Clara Bertolissi, Maribel Fernández, Steve Barker
    Dynamic Event-Based Access Control as Term Rewriting. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:195-210 [Conf]
  16. Indrakshi Ray, Manachai Toahchoodee
    A Spatio-temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:211-226 [Conf]
  17. Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
    Towards a Times-Based Usage Control Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:227-242 [Conf]
  18. Yanjiang Yang, Yingjiu Li, Robert H. Deng
    New Paradigm of Inference Control with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:243-258 [Conf]
  19. Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
    Security Patterns for Physical Access Control Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:259-274 [Conf]
  20. Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
    XACML Policies for Exclusive Resource Usage. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:275-290 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002