The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2005 (conf/sdmw/2005)

  1. Hakan Hacigümüs, Sharad Mehrotra
    Efficient Key Updates in Encrypted Database Systems. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:1-15 [Conf]
  2. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:16-32 [Conf]
  3. Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker
    Experiments with Queries over Encrypted Data Using Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:33-46 [Conf]
  4. Martin Wimmer, Alfons Kemper
    An Authorization Framework for Sharing Data in Web Service Federations. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:47-62 [Conf]
  5. Amir H. Chinaei, Frank Wm. Tompa
    User-Managed Access Control for Health Care Systems. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:63-72 [Conf]
  6. Cecilia Ionita, Sylvia L. Osborn
    Specifying an Access Control Model for Ontologies for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:73-85 [Conf]
  7. Alban Gabillon
    A Formal Access Control Model for XML Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:86-103 [Conf]
  8. Ganesh Ramesh
    Can Attackers Learn from Samples? [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:104-123 [Conf]
  9. Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman
    Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:124-142 [Conf]
  10. Stefan Böttcher, Rita Steinmetz
    Detecting Privacy Violations in Sensitive XML Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:143-154 [Conf]
  11. Ayça Azgin Hintoglu, Yücel Saygin
    Suppressing Microdata to Prevent Probabilistic Classification Based Inference. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:155-169 [Conf]
  12. David J. Power, Mark Slaymaker, Andrew C. Simpson
    On Deducibility and Anonymisation in Medical Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:170-184 [Conf]
  13. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Protecting Privacy Against Location-Based Personal Identification. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:185-199 [Conf]
  14. Boris Dragovic, Calicrates Policroniades
    Information SeeSaw: Availability vs. Security Management in the UbiComp World. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:200-216 [Conf]
  15. Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, Erik Moll
    XML Security in the Next Generation Optical Disc Context. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:217-233 [Conf]
  16. Yumin Yuan
    Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:234-240 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002