The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2005 (conf/dbsec/2005)

  1. Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava
    Streams, Security and Scalability. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:1-15 [Conf]
  2. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Towards Privacy-Enhanced Authorization Policies and Languages. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:16-27 [Conf]
  3. Andreas Schaad
    Revocation of Obligation and Authorisation Policy Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:28-39 [Conf]
  4. Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting
    Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:40-53 [Conf]
  5. Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes
    Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:54-68 [Conf]
  6. Jun Li, Edward Omiecinski
    Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:69-83 [Conf]
  7. Glen Nuckolls
    Verified Query Results from Hybrid Authentication Trees. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:84-98 [Conf]
  8. Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham
    Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:99-113 [Conf]
  9. Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    Secrecy of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:114-123 [Conf]
  10. Tai Xin, Yajie Zhu, Indrakshi Ray
    Reliable Scheduling of Advanced Transactions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:124-138 [Conf]
  11. Jaideep Vaidya, Chris Clifton
    Privacy-Preserving Decision Trees over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:139-152 [Conf]
  12. Justin Z. Zhan, Stan Matwin, LiWu Chang
    Privacy-Preserving Collaborative Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:153-165 [Conf]
  13. Wei Jiang, Chris Clifton
    Privacy-Preserving Distributed k-Anonymity. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:166-177 [Conf]
  14. Kun Bai, Hai Wang, Peng Liu
    Towards Database Firewalls. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:178-192 [Conf]
  15. Alex X. Liu, Mohamed G. Gouda
    Complete Redundancy Detection in Firewalls. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:193-206 [Conf]
  16. Adrian Spalka, Jan Lehnhardt
    A Comprehensive Approach to Anomaly Detection in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:207-221 [Conf]
  17. Sarath Indrakanti, Vijay Varadharajan
    An Authorization Architecture for Web Services. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:222-236 [Conf]
  18. Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong
    Secure Model Management Operations for the Web. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:237-251 [Conf]
  19. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:252-266 [Conf]
  20. Joachim Biskup, Barbara Sprick, Lena Wiese
    Secure Mediation with Mobile Code. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:267-280 [Conf]
  21. Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
    Security Vulnerabilities in Software Systems: A Quantitative Perspective. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:281-294 [Conf]
  22. Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert
    Trading Off Security in a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:295-309 [Conf]
  23. Joon S. Park, Harish S. Krishnan
    Trusted Identity and Session Management Using Secure Cookies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:310-324 [Conf]
  24. Murat Kantarcioglu, Chris Clifton
    Security Issues in Querying Encrypted Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:325-337 [Conf]
  25. Amihai Motro, Francesco Parisi-Presicce
    Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:338-352 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002