The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2008 (conf/sdmw/2008)

  1. How Anonymous Is k-Anonymous? Look at Your Quasi-ID. [Citation Graph (, )][DBLP]

  2. Simulatable Binding: Beyond Simulatable Auditing. [Citation Graph (, )][DBLP]

  3. ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. [Citation Graph (, )][DBLP]

  4. Responding to Anomalous Database Requests. [Citation Graph (, )][DBLP]

  5. Auditing Inference Based Disclosures in Dynamic Databases. [Citation Graph (, )][DBLP]

  6. An Approach to Evaluate Data Trustworthiness Based on Data Provenance. [Citation Graph (, )][DBLP]

  7. Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. [Citation Graph (, )][DBLP]

  8. A Trusted Approach to E-Commerce. [Citation Graph (, )][DBLP]

  9. A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. [Citation Graph (, )][DBLP]

  10. Query Rewriting for Access Control on Semantic Web. [Citation Graph (, )][DBLP]

  11. On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. [Citation Graph (, )][DBLP]

  12. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP]

  13. A Methodology for Bridging between RBAC and an Arbitrary Application Program. [Citation Graph (, )][DBLP]

  14. An Anonymity Model Achievable Via Microaggregation. [Citation Graph (, )][DBLP]

  15. Engineering Privacy Requirements in Business Intelligence Applications. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002