|
Conferences in DBLP
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. [Citation Graph (, )][DBLP]
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. [Citation Graph (, )][DBLP]
Database Intrusion Detection Using Role Profiling with Role Hierarchy. [Citation Graph (, )][DBLP]
Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP]
An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]
A Flexible Access Control Model for Distributed Collaborative Editors. [Citation Graph (, )][DBLP]
On the Construction and Verification of Self-modifying Access Control Policies. [Citation Graph (, )][DBLP]
Controlling Access to XML Documents over XML Native and Relational Databases. [Citation Graph (, )][DBLP]
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity. [Citation Graph (, )][DBLP]
L-Cover: Preserving Diversity by Anonymity. [Citation Graph (, )][DBLP]
|