|
Conferences in DBLP
- Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava
Streams, Security and Scalability. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:1-15 [Conf]
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Towards Privacy-Enhanced Authorization Policies and Languages. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:16-27 [Conf]
- Andreas Schaad
Revocation of Obligation and Authorisation Policy Objects. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:28-39 [Conf]
- Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:40-53 [Conf]
- Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes
Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:54-68 [Conf]
- Jun Li, Edward Omiecinski
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:69-83 [Conf]
- Glen Nuckolls
Verified Query Results from Hybrid Authentication Trees. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:84-98 [Conf]
- Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham
Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:99-113 [Conf]
- Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
Secrecy of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:114-123 [Conf]
- Tai Xin, Yajie Zhu, Indrakshi Ray
Reliable Scheduling of Advanced Transactions. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:124-138 [Conf]
- Jaideep Vaidya, Chris Clifton
Privacy-Preserving Decision Trees over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:139-152 [Conf]
- Justin Z. Zhan, Stan Matwin, LiWu Chang
Privacy-Preserving Collaborative Association Rule Mining. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:153-165 [Conf]
- Wei Jiang, Chris Clifton
Privacy-Preserving Distributed k-Anonymity. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:166-177 [Conf]
- Kun Bai, Hai Wang, Peng Liu
Towards Database Firewalls. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:178-192 [Conf]
- Alex X. Liu, Mohamed G. Gouda
Complete Redundancy Detection in Firewalls. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:193-206 [Conf]
- Adrian Spalka, Jan Lehnhardt
A Comprehensive Approach to Anomaly Detection in Relational Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:207-221 [Conf]
- Sarath Indrakanti, Vijay Varadharajan
An Authorization Architecture for Web Services. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:222-236 [Conf]
- Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong
Secure Model Management Operations for the Web. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:237-251 [Conf]
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:252-266 [Conf]
- Joachim Biskup, Barbara Sprick, Lena Wiese
Secure Mediation with Mobile Code. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:267-280 [Conf]
- Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
Security Vulnerabilities in Software Systems: A Quantitative Perspective. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:281-294 [Conf]
- Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert
Trading Off Security in a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:295-309 [Conf]
- Joon S. Park, Harish S. Krishnan
Trusted Identity and Session Management Using Secure Cookies. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:310-324 [Conf]
- Murat Kantarcioglu, Chris Clifton
Security Issues in Querying Encrypted Data. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:325-337 [Conf]
- Amihai Motro, Francesco Parisi-Presicce
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:338-352 [Conf]
|