The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2009 (conf/sdmw/2009)


  1. Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. [Citation Graph (, )][DBLP]


  2. Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. [Citation Graph (, )][DBLP]


  3. Database Intrusion Detection Using Role Profiling with Role Hierarchy. [Citation Graph (, )][DBLP]


  4. Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP]


  5. An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]


  6. A Flexible Access Control Model for Distributed Collaborative Editors. [Citation Graph (, )][DBLP]


  7. On the Construction and Verification of Self-modifying Access Control Policies. [Citation Graph (, )][DBLP]


  8. Controlling Access to XML Documents over XML Native and Relational Databases. [Citation Graph (, )][DBLP]


  9. Longitude: Centralized Privacy-Preserving Computation of Users' Proximity. [Citation Graph (, )][DBLP]


  10. L-Cover: Preserving Diversity by Anonymity. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002