The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2007 (conf/sdmw/2007)

  1. Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa
    A Unified Conflict Resolution Algorithm. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:1-17 [Conf]
  2. Birgit Pfitzmann
    Multi-layer Audit of Access Rights. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:18-32 [Conf]
  3. M. A. C. Dekker, Sandro Etalle
    Refinement for Administrative Policies. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:33-46 [Conf]
  4. Weiwei Cheng, Kian-Lee Tan
    Authenticating kNN Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:47-63 [Conf]
  5. Nataliya Rassadko
    Query Rewriting Algorithm Evaluation for XML Security Views. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:64-80 [Conf]
  6. Alexander Brodsky, Lei Zhang, Sushil Jajodia
    Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:81-95 [Conf]
  7. Xin Jin, Sylvia L. Osborn
    Architecture for Data Collection in Database Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:96-107 [Conf]
  8. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
    Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:108-123 [Conf]
  9. Traian Marius Truta, Alina Campan, Paul Meyer
    Generating Microdata with P -Sensitive K -Anonymity Property. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:124-141 [Conf]
  10. Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén
    Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:142-157 [Conf]
  11. Rafae Bhatti, Tyrone Grandison
    Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:158-173 [Conf]
  12. Ragib Hasan, Marianne Winslett, Radu Sion
    Requirements of Secure Storage Systems for Healthcare Records. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:174-180 [Conf]
  13. Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas
    An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:181-192 [Conf]
  14. Josep Domingo-Ferrer
    A Three-Dimensional Conceptual Framework for Database Privacy. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:193-202 [Conf]
  15. N. W. Lo, Kuo-Hui Yeh
    Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:203-212 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002