Database security and privacy
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Pierangela Samarati | Sara Foresti | P. Samarati | S. Vimercati | S. Jajodia | S. Foresti
[1] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[2] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[3] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[4] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[5] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[6] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, CSUR.
[7] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[8] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[9] Elisa Bertino,et al. Database Security: Research and Practice , 1995, Inf. Syst..
[10] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[11] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[12] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[13] Elisa Bertino,et al. Authorizations in relational database management systems , 1993, CCS '93.
[14] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[15] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[16] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.