


default search action
SDM 2004: Toronto, Ontario, Canada (in conjuction with VLDB 2004)
- Willem Jonker, Milan Petkovic:

Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings. Lecture Notes in Computer Science 3178, Springer 2004, ISBN 3-540-22983-3
Encrypted Data Access
- Ping Lin, K. Selçuk Candan:

Secure and Privacy Preserving Outsourcing of Tree Structured Data. 1-17 - Richard Brinkman, Jeroen Doumen, Willem Jonker:

Using Secret Sharing for Searching in Encrypted Data. 18-27 - Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes:

A Structure Preserving Database Encryption Scheme. 28-40 - Gerome Miklau, Dan Suciu

:
Modeling Integrity in Data Exchange. 41-54
Privacy Preserving Data Management
- Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang:

Experimental Analysis of Privacy-Preserving Statistics Computation. 55-66 - Stanley R. M. Oliveira, Osmar R. Zaïane:

Achieving Privacy Preservation when Sharing Data for Clustering. 67-82 - Claudine Conrado, Milan Petkovic, Willem Jonker:

Privacy-Preserving Digital Rights Management. 83-99 - Dawn N. Jutla, Peter Bodorik

, Deyun Gao:
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. 100-117
Access Control
- Wolfgang Nejdl

, Daniel Olmedilla, Marianne Winslett:
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. 118-132 - Bo Luo

, Dongwon Lee, Wang-Chien Lee, Peng Liu:
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. 133-147 - Arnon Rosenthal, Edward Sciore:

Abstracting and Refining Authorization in SQL. 148-162 - Shengli Sheng, Sylvia L. Osborn:

A Classifier-Based Approach to User-Role Assignment for Web Applications. 163-171 - Hai Yu, Ee-Peng Lim

:
LTAM: A Location-Temporal Authorization Model. 172-186
Database Security
- Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:

Identifying Sensitive Associations in Databases for Release Control. 187-201 - Magesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish:

Using Delay to Defend Against Database Extraction. 202-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














