XGuard: a system for publishing XML documents without information leakage in the presence of data inference
暂无分享,去创建一个
Ge Yu | Lei Shi | Chen Li | Xiaochun Yang
[1] Fausto Giunchiglia,et al. Data Management for Peer-to-Peer Computing : A Vision , 2002, WebDB.
[2] Teresa F. Lunt,et al. A Semantic Framework of the Multilevel Secure Relational Model , 1997, IEEE Trans. Knowl. Data Eng..
[3] Laks V. S. Lakshmanan,et al. Compressed Accessibility Map: Efficient Access Control for XML , 2002, VLDB.
[4] Wenfei Fan,et al. Secure XML querying with security views , 2004, SIGMOD '04.
[5] Gabriel M. Kuper,et al. A unified constraint model for XML , 2001, WWW '01.
[6] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[7] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[8] Chen Li,et al. Secure XML Publishing without Information Leakage in the Presence of Data Inference , 2004, VLDB.
[9] Nils J. Nilsson,et al. Principles of Artificial Intelligence , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[11] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[12] Laks V. S. Lakshmanan,et al. Minimization of tree pattern queries , 2001, SIGMOD '01.
[13] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[14] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[15] Chen Li,et al. RACCOON: a peer-based system for data integration and sharing , 2004, Proceedings. 20th International Conference on Data Engineering.
[16] Forouzan Golshani,et al. Proceedings of the Eighth International Conference on Data Engineering , 1992 .
[17] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[18] Sushil Jajodia,et al. Inference Problems in Multilevel Secure Database Management Systems , 2006 .
[19] Jesfis Peral,et al. Heuristics -- intelligent search strategies for computer problem solving , 1984 .
[20] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[21] Joachim Biskup,et al. Controlled Query Evaluation for Known Policies by Combining Lying and Refusal , 2002, FoIKS.
[22] Beng Chin Ooi,et al. PeerDB: a P2P-based system for distributed data sharing , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[23] Alban Gabillon,et al. Regulating Access to XML documents , 2001, DBSec.
[24] Sabrina De Capitani di Vimercati,et al. Minimal data upgrading to prevent inference and association attacks , 1999, PODS '99.
[25] Elisa Bertino,et al. A Secure Publishing Service for Digital Libraries of XML Documents , 2001, ISC.