Conferences in DBLP
Amir H. Chinaei , Hamid R. Chinaei , Frank Wm. Tompa A Unified Conflict Resolution Algorithm. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:1-17 [Conf ] Birgit Pfitzmann Multi-layer Audit of Access Rights. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:18-32 [Conf ] M. A. C. Dekker , Sandro Etalle Refinement for Administrative Policies. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:33-46 [Conf ] Weiwei Cheng , Kian-Lee Tan Authenticating kNN Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:47-63 [Conf ] Nataliya Rassadko Query Rewriting Algorithm Evaluation for XML Security Views. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:64-80 [Conf ] Alexander Brodsky , Lei Zhang , Sushil Jajodia Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:81-95 [Conf ] Xin Jin , Sylvia L. Osborn Architecture for Data Collection in Database Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:96-107 [Conf ] Peishun Wang , Huaxiong Wang , Josef Pieprzyk Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:108-123 [Conf ] Traian Marius Truta , Alina Campan , Paul Meyer Generating Microdata with P -Sensitive K -Anonymity Property. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:124-141 [Conf ] Martin Boldt , Bengt Carlsson , Tobias Larsson , Niklas Lindén Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:142-157 [Conf ] Rafae Bhatti , Tyrone Grandison Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:158-173 [Conf ] Ragib Hasan , Marianne Winslett , Radu Sion Requirements of Secure Storage Systems for Healthcare Records. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:174-180 [Conf ] Hasika Pamunuwa , Duminda Wijesekera , Csilla Farkas An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:181-192 [Conf ] Josep Domingo-Ferrer A Three-Dimensional Conceptual Framework for Database Privacy. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:193-202 [Conf ] N. W. Lo , Kuo-Hui Yeh Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:203-212 [Conf ]