|
Conferences in DBLP
- Ping Lin, K. Selçuk Candan
Secure and Privacy Preserving Outsourcing of Tree Structured Data. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:1-17 [Conf]
- Richard Brinkman, Jeroen Doumen, Willem Jonker
Using Secret Sharing for Searching in Encrypted Data. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:18-27 [Conf]
- Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:28-40 [Conf]
- Gerome Miklau, Dan Suciu
Modeling Integrity in Data Exchange. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:41-54 [Conf]
- Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
Experimental Analysis of Privacy-Preserving Statistics Computation. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:55-66 [Conf]
- Stanley R. M. Oliveira, Osmar R. Zaïane
Achieving Privacy Preservation when Sharing Data for Clustering. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:67-82 [Conf]
- Claudine Conrado, Milan Petkovic, Willem Jonker
Privacy-Preserving Digital Rights Management. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:83-99 [Conf]
- Dawn N. Jutla, Peter Bodorik, Deyun Gao
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:100-117 [Conf]
- Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:118-132 [Conf]
- Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:133-147 [Conf]
- Arnon Rosenthal, Edward Sciore
Abstracting and Refining Authorization in SQL. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:148-162 [Conf]
- Shengli Sheng, Sylvia L. Osborn
A Classifier-Based Approach to User-Role Assignment for Web Applications. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:163-171 [Conf]
- Hai Yu, Ee-Peng Lim
LTAM: A Location-Temporal Authorization Model. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:172-186 [Conf]
- Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
Identifying Sensitive Associations in Databases for Release Control. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:187-201 [Conf]
- Magesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish
Using Delay to Defend Against Database Extraction. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2004, pp:202-218 [Conf]
|