Data Security and Privacy
暂无分享,去创建一个
Satyen Abrol | Raymond Heatherly | Murat Kantarcioglu | Vaibhav Khadilkar | Latifur Khan | Bhavani Thuraisingham | Murat Kantarcioglu | B. Thuraisingham | L. Khan | R. Heatherly | Satyen Abrol | V. Khadilkar
[1] Elisa Bertino,et al. Correctness of semantic integrity checking in database management systems , 1988, Acta Informatica.
[2] Elisa Bertino. Digital identity management and protection , 2006, PST.
[3] Bhavani M. Thuraisingham,et al. Privacy constraint processing in a privacy-enhanced database management system , 2005, Data Knowl. Eng..
[4] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[5] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[6] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[7] Elisa Bertino,et al. Protection and administration of XML data sources , 2002, Data Knowl. Eng..
[8] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[9] Bhavani M. Thuraisingham,et al. Design and Implementation of a Database Inference Controller , 1993, Data Knowl. Eng..
[10] Bhavani M. Thuraisingham,et al. Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..
[11] Bhavani M. Thuraisingham,et al. Multilevel Security in Database Management Systems , 1987, Comput. Secur..
[12] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.