Minimum cost rule enforcement for cooperative database access
暂无分享,去创建一个
[1] Jonathan Goldstein,et al. Optimizing queries using materialized views: a practical, scalable solution , 2001, SIGMOD '01.
[2] Y HalevyAlon. Answering queries using views: A survey , 2001, VLDB 2001.
[3] Sushil Jajodia,et al. Consistency and enforcement of access rules in cooperative data sharing environment , 2014, Comput. Secur..
[4] Chen Li,et al. Computing complete answers to queries in the presence of limited access patterns , 2003, The VLDB Journal.
[5] Sushil Jajodia,et al. Consistent Query Plan Generation in Secure Cooperative Data Access , 2014, DBSec.
[6] Alberto O. Mendelzon,et al. Authorization Views and Conditional Query Containment , 2005, ICDT.
[7] Surajit Chaudhuri,et al. An overview of query optimization in relational systems , 1998, PODS.
[8] Sushil Jajodia,et al. Rule Enforcement with Third Parties in Secure Cooperative Data Access , 2013, DBSec.
[9] Sushil Jajodia,et al. Controlled Information Sharing in Collaborative Distributed Query Processing , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[10] Eugene Wong,et al. Query processing in a system for distributed databases (SDD-1) , 1981, TODS.
[11] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[12] Sushil Jajodia,et al. Authorization enforcement in distributed query evaluation , 2011, J. Comput. Secur..
[13] Murat Kantarcioglu,et al. Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[14] Alon Y. Halevy,et al. MiniCon: A scalable algorithm for answering queries using views , 2000, The VLDB Journal.
[15] Sushil Jajodia,et al. Keep a Few: Outsourcing Data While Maintaining Confidentiality , 2009, ESORICS.
[16] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[17] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[18] Sushil Jajodia,et al. Access rule consistency in cooperative data access environment , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[19] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[20] Andrea Calì,et al. Querying Data under Access Limitations , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[21] Donald Kossmann,et al. The state of the art in distributed query processing , 2000, CSUR.
[22] Alon Y. Halevy,et al. Answering queries using views: A survey , 2001, The VLDB Journal.