|
Conferences in DBLP
- Hakan Hacigümüs, Sharad Mehrotra
Efficient Key Updates in Encrypted Database Systems. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:1-15 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:16-32 [Conf]
- Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker
Experiments with Queries over Encrypted Data Using Secret Sharing. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:33-46 [Conf]
- Martin Wimmer, Alfons Kemper
An Authorization Framework for Sharing Data in Web Service Federations. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:47-62 [Conf]
- Amir H. Chinaei, Frank Wm. Tompa
User-Managed Access Control for Health Care Systems. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:63-72 [Conf]
- Cecilia Ionita, Sylvia L. Osborn
Specifying an Access Control Model for Ontologies for the Semantic Web. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:73-85 [Conf]
- Alban Gabillon
A Formal Access Control Model for XML Databases. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:86-103 [Conf]
- Ganesh Ramesh
Can Attackers Learn from Samples? [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:104-123 [Conf]
- Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman
Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:124-142 [Conf]
- Stefan Böttcher, Rita Steinmetz
Detecting Privacy Violations in Sensitive XML Databases. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:143-154 [Conf]
- Ayça Azgin Hintoglu, Yücel Saygin
Suppressing Microdata to Prevent Probabilistic Classification Based Inference. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:155-169 [Conf]
- David J. Power, Mark Slaymaker, Andrew C. Simpson
On Deducibility and Anonymisation in Medical Databases. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:170-184 [Conf]
- Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
Protecting Privacy Against Location-Based Personal Identification. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:185-199 [Conf]
- Boris Dragovic, Calicrates Policroniades
Information SeeSaw: Availability vs. Security Management in the UbiComp World. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:200-216 [Conf]
- Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, Erik Moll
XML Security in the Next Generation Optical Disc Context. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:217-233 [Conf]
- Yumin Yuan
Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:234-240 [Conf]
|