Access control over uncertain data
暂无分享,去创建一个
[1] Serge Abiteboul,et al. Complexity of answering queries using materialized views , 1998, PODS.
[2] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[3] Philippe Balbiani. Access control with uncertain surveillance , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).
[4] Amihai Motro,et al. An access authorization model for relational databases based on algebraic manipulation of view definitions , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[5] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[6] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[7] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[8] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[9] Dan Suciu,et al. Efficient query evaluation on probabilistic databases , 2004, The VLDB Journal.
[10] Prithviraj Sen,et al. Representing and Querying Correlated Tuples in Probabilistic Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[11] Christopher Ré,et al. Materialized Views in Probabilistic Databases for Information Exchange and Query Optimization , 2007, VLDB.
[12] Minos N. Garofalakis,et al. Adaptive cleaning for RFID data streams , 2006, VLDB.
[13] Michael R. Genesereth,et al. Answering recursive queries using views , 1997, PODS '97.
[14] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[15] SuciuDan,et al. Access control over uncertain data , 2008, VLDB 2008.
[16] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[17] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[18] Christopher Ré,et al. Event queries on correlated probabilistic streams , 2008, SIGMOD Conference.
[19] Jorge Lobo,et al. On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.
[20] Arnon Rosenthal,et al. Abstracting and Refining Authorization in SQL , 2004, Secure Data Management.