The SCEAS System
Navigation Menu

Conferences in DBLP

Secure Data Management (sdmw)
2006 (conf/sdmw/2006)

  1. Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia
    Indistinguishability: The Other Aspect of Privacy. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:1-17 [Conf]
  2. Stefan Böttcher, Sebastian Obermeier
    Sovereign Information Sharing Among Malicious Partners. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:18-29 [Conf]
  3. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Temporal Context Lie Detection and Generation. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:30-47 [Conf]
  4. Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li
    Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:48-63 [Conf]
  5. Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee
    Difference Set Attacks on Conjunctive Keyword Search Schemes. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:64-74 [Conf]
  6. Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee
    Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:75-83 [Conf]
  7. P. Krishna Prasad, C. Pandu Rangan
    Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:84-99 [Conf]
  8. Yunyu Song, Sylvia L. Osborn
    Conflict of Interest in the Administrative Role Graph Model. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:100-114 [Conf]
  9. Changwoo Byun, Seog Park
    Two Phase Filtering for XML Access Control. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:115-130 [Conf]
  10. Amir H. Chinaei, Huaxin Zhang
    Hybrid Authorizations and Conflict Resolution. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:131-145 [Conf]
  11. Ulrich Kühn
    Analysis of a Database and Index Encryption Scheme - Problems and Fixes. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:146-159 [Conf]
  12. Stefan Böttcher, Rita Steinmetz
    Information Disclosure by XPath Queries. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:160-174 [Conf]
  13. Hakan Hacigümüs
    SPIDER: An Autonomic Computing Approach to Database Security Management. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:175-183 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002