Rule Enforcement with Third Parties in Secure Cooperative Data Access
暂无分享,去创建一个
[1] Eugene Wong,et al. Query processing in a system for distributed databases (SDD-1) , 1981, TODS.
[2] Sushil Jajodia,et al. Rule Configuration Checking in Secure Cooperative Data Access , 2012, SafeConfig.
[3] Donald Kossmann,et al. The state of the art in distributed query processing , 2000, CSUR.
[4] Durgesh Kumar Mishra,et al. A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining , 2009 .
[5] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[6] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[7] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[8] Lakshminarayanan Subramanian,et al. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases , 2009, NDSS.
[9] Surajit Chaudhuri,et al. An overview of query optimization in relational systems , 1998, PODS.
[10] Sushil Jajodia,et al. Controlled Information Sharing in Collaborative Distributed Query Processing , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[11] Murat Kantarcioglu,et al. Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).