The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2004 (conf/sdmw/2004)

  1. Ping Lin, K. Selçuk Candan
    Secure and Privacy Preserving Outsourcing of Tree Structured Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:1-17 [Conf]
  2. Richard Brinkman, Jeroen Doumen, Willem Jonker
    Using Secret Sharing for Searching in Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:18-27 [Conf]
  3. Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:28-40 [Conf]
  4. Gerome Miklau, Dan Suciu
    Modeling Integrity in Data Exchange. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:41-54 [Conf]
  5. Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
    Experimental Analysis of Privacy-Preserving Statistics Computation. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:55-66 [Conf]
  6. Stanley R. M. Oliveira, Osmar R. Zaïane
    Achieving Privacy Preservation when Sharing Data for Clustering. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:67-82 [Conf]
  7. Claudine Conrado, Milan Petkovic, Willem Jonker
    Privacy-Preserving Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:83-99 [Conf]
  8. Dawn N. Jutla, Peter Bodorik, Deyun Gao
    Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:100-117 [Conf]
  9. Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett
    PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:118-132 [Conf]
  10. Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
    A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:133-147 [Conf]
  11. Arnon Rosenthal, Edward Sciore
    Abstracting and Refining Authorization in SQL. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:148-162 [Conf]
  12. Shengli Sheng, Sylvia L. Osborn
    A Classifier-Based Approach to User-Role Assignment for Web Applications. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:163-171 [Conf]
  13. Hai Yu, Ee-Peng Lim
    LTAM: A Location-Temporal Authorization Model. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:172-186 [Conf]
  14. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Identifying Sensitive Associations in Databases for Release Control. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:187-201 [Conf]
  15. Magesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish
    Using Delay to Defend Against Database Extraction. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:202-218 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002