Database security and privacy

1.

[1]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[2]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[3]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[4]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[5]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[6]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, CSUR.

[7]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[8]  Andris Ambainis,et al.  On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .

[9]  Elisa Bertino,et al.  Database Security: Research and Practice , 1995, Inf. Syst..

[10]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[11]  William Cheswick,et al.  Firewalls and Internet Security , 1994 .

[12]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[13]  Elisa Bertino,et al.  Authorizations in relational database management systems , 1993, CCS '93.

[14]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[15]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[16]  Niv Gilboa,et al.  Computationally private information retrieval (extended abstract) , 1997, STOC '97.