The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2010 (conf/dbsec/2010)

  1. Generalizing PIR for Practical Private Retrieval of Public Data. [Citation Graph (, )][DBLP]

  2. A Logic of Privacy. [Citation Graph (, )][DBLP]

  3. Understanding Privacy Risk of Publishing Decision Trees. [Citation Graph (, )][DBLP]

  4. Secure Outsourcing of DNA Searching via Finite Automata. [Citation Graph (, )][DBLP]

  5. A Labelling System for Derived Data Control. [Citation Graph (, )][DBLP]

  6. On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP]

  7. Role Mining in the Presence of Noise. [Citation Graph (, )][DBLP]

  8. Distributed and Secure Access Control in P2P Databases. [Citation Graph (, )][DBLP]

  9. Constructing Key Assignment Schemes from Chain Partitions. [Citation Graph (, )][DBLP]

  10. fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. [Citation Graph (, )][DBLP]

  11. Efficient Inference Control for Open Relational Queries. [Citation Graph (, )][DBLP]

  12. Query Racing: Fast Completeness Certification of Query Results. [Citation Graph (, )][DBLP]

  13. Mining Likely Properties of Access Control Policies via Association Rule Mining. [Citation Graph (, )][DBLP]

  14. Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. [Citation Graph (, )][DBLP]

  15. Enforcing Request Integrity in Web Applications. [Citation Graph (, )][DBLP]

  16. Using Trust-Based Information Aggregation for Predicting Security Level of Systems. [Citation Graph (, )][DBLP]

  17. Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. [Citation Graph (, )][DBLP]

  18. Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. [Citation Graph (, )][DBLP]

  19. An Access Control Model for Web Databases. [Citation Graph (, )][DBLP]

  20. Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. [Citation Graph (, )][DBLP]

  21. Evaluating the Risk of Adopting RBAC Roles. [Citation Graph (, )][DBLP]

  22. Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. [Citation Graph (, )][DBLP]

  23. When ABE Meets RSS. [Citation Graph (, )][DBLP]

  24. PriMan : A Privacy-Preserving Identity Framework. [Citation Graph (, )][DBLP]

  25. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. [Citation Graph (, )][DBLP]

  26. Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. [Citation Graph (, )][DBLP]

  27. A Secure RFID Ticket System for Public Transport. [Citation Graph (, )][DBLP]

  28. Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. [Citation Graph (, )][DBLP]

  29. Secure Location Verification - A Security Analysis of GPS Signal Authentication. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002