Detection of Guilt Model for Data Leakage
暂无分享,去创建一个
[1] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[2] Peter Buneman,et al. Provenance in databases , 2009, SIGMOD '07.
[3] Sabrina De Capitani di Vimercati,et al. An algebra for composing access control policies , 2002, TSEC.
[4] Rajeev Motwani,et al. Towards robustness in query auditing , 2006, VLDB.
[5] Hector Garcia-Molina,et al. Privacy, Preservation and Performance: The 3 P's of Distributed Data Management , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[6] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[7] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[8] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[9] Jianmin Wang,et al. An Improved Algorithm to Watermark Numeric Relational Data , 2005, WISA.
[10] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[11] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[12] Richard Fromm,et al. Digital Music Distribution and Audio Watermarking , 2007 .
[13] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[14] Jennifer Widom,et al. Lineage tracing for general data warehouse transformations , 2003, The VLDB Journal.