Conferences in DBLP
Chao Yao , Lingyu Wang , Xiaoyang Sean Wang , Sushil Jajodia Indistinguishability: The Other Aspect of Privacy. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:1-17 [Conf ] Stefan Böttcher , Sebastian Obermeier Sovereign Information Sharing Among Malicious Partners. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:18-29 [Conf ] Xiangdong An , Dawn N. Jutla , Nick Cercone Temporal Context Lie Detection and Generation. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:30-47 [Conf ] Ji-Won Byun , Yonglak Sohn , Elisa Bertino , Ninghui Li Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:48-63 [Conf ] Hyun Sook Rhee , Ik Rae Jeong , Jin Wook Byun , Dong Hoon Lee Difference Set Attacks on Conjunctive Keyword Search Schemes. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:64-74 [Conf ] Jin Wook Byun , Hyun Suk Rhee , Hyun-A Park , Dong Hoon Lee Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:75-83 [Conf ] P. Krishna Prasad , C. Pandu Rangan Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:84-99 [Conf ] Yunyu Song , Sylvia L. Osborn Conflict of Interest in the Administrative Role Graph Model. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:100-114 [Conf ] Changwoo Byun , Seog Park Two Phase Filtering for XML Access Control. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:115-130 [Conf ] Amir H. Chinaei , Huaxin Zhang Hybrid Authorizations and Conflict Resolution. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:131-145 [Conf ] Ulrich Kühn Analysis of a Database and Index Encryption Scheme - Problems and Fixes. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:146-159 [Conf ] Stefan Böttcher , Rita Steinmetz Information Disclosure by XPath Queries. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:160-174 [Conf ] Hakan Hacigümüs SPIDER: An Autonomic Computing Approach to Database Security Management. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:175-183 [Conf ]