On Inference-Proof View Processing of XML Documents
暂无分享,去创建一个
Joachim Biskup | Lan Li | J. Biskup | Lan Li
[1] Maarten Marx,et al. Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.
[2] Wenfei Fan,et al. Secure XML querying with security views , 2004, SIGMOD '04.
[3] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[4] Bertram Ludäscher,et al. Parallelizing XML data-streaming workflows via MapReduce , 2010, J. Comput. Syst. Sci..
[5] Joachim Biskup. Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution , 2010, DNIS.
[6] Sushil Jajodia,et al. Checking for k-Anonymity Violation by Views , 2005, VLDB.
[7] Chen Li,et al. Secure XML Publishing without Information Leakage in the Presence of Data Inference , 2004, VLDB.
[8] Wang Yuan-zhen,et al. An approach for XML inference control based on RDF , 2006 .
[9] Yuanzhen Wang,et al. An Approach for XML Inference Control Based on RDF , 2006, DEXA.
[10] Gultekin Özsoyoglu,et al. Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.
[11] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[12] Joachim Biskup,et al. Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation , 2010, IWSEC.
[13] Benjamin C. M. Fung,et al. Anonymizing sequential releases , 2006, KDD '06.
[14] Georg Gottlob,et al. Efficient Algorithms for Processing XPath Queries , 2002, VLDB.
[15] Ruizhong Wei,et al. A dynamic method for handling the inference problem in multilevel secure databases , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[16] Chen Zhan-sheng,et al. Strong functional dependencies and their application to normal forms in XML , 2005 .
[17] Toru Fujiwara,et al. Verification of the Security against Inference Attacks on XML Databases , 2009 .
[18] Steven J. DeRose,et al. XML Path Language (XPath) Version 1.0 , 1999 .
[19] Elisa Bertino,et al. Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.
[20] Sushil Jajodia,et al. Inference Problems in Multilevel Secure Database Management Systems , 2006 .
[21] Serge Abiteboul,et al. Representing and querying XML with incomplete information , 2001, PODS '01.
[22] Marcelo Arenas,et al. A normal form for XML documents , 2002, PODS '02.
[23] Sven Hartmann,et al. Efficient reasoning about a robust XML key fragment , 2009, TODS.
[24] Joachim Biskup,et al. Controlled query evaluation with open queries for a decidable relational submodel , 2007, Annals of Mathematics and Artificial Intelligence.
[25] Sushil Jajodia,et al. Unauthorized inferences in semistructured databases , 2006, Inf. Sci..
[26] Chengkai Li,et al. An optimization framework for map-reduce queries , 2012, EDBT '12.
[27] Joachim Biskup,et al. Preprocessing for controlled query evaluation with availability policy , 2008, J. Comput. Secur..
[28] Bhavani M. Thuraisingham,et al. Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries , 2011, 2011 IEEE International Conference on Web Services.
[29] Wenfei Fan,et al. Rewriting Regular XPath Queries on XML Views , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[30] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[31] Gabriel M. Kuper,et al. Generalized XML security views , 2005, SACMAT.
[32] Joachim Biskup,et al. Towards Controlled Query Evaluation for Incomplete First-Order Databases , 2010, FoIKS.
[33] Sophie Tison,et al. XML Security Views Revisited , 2009, DBPL.
[34] Béatrice Finance,et al. The case for access control on XML relationships , 2005, CIKM '05.
[35] Joachim Biskup,et al. A sound and complete model-generation procedure for consistent and confidentiality-preserving databases , 2011, Theor. Comput. Sci..
[36] Cristina Sirangelo,et al. XML with incomplete information , 2010, JACM.
[37] Georg Gottlob,et al. The complexity of XPath query evaluation and XML typing , 2005, JACM.
[38] Jianhua Li,et al. Enforce Mandatory Access Control Policy on XML Documents , 2005, ICICS.