Selective and authentic third-party distribution of XML documents
暂无分享,去创建一个
Elisa Bertino | Bhavani M. Thuraisingham | Barbara Carminati | Elena Ferrari | Amar Gupta | E. Bertino | B. Thuraisingham | E. Ferrari | Amar Gupta | B. Carminati
[1] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[2] P. Resnick,et al. Protocols for automated negotiations with buyer anonymity and seller reputations , 2000 .
[3] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Bhavani M. Thuraisingham,et al. Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..
[6] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[7] Hiroshi Maruyama,et al. Digest Values for DOM (DOMHASH) , 2000, RFC.
[8] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[9] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Elisa Bertino,et al. Securing XML Documents with Author-X , 2001, IEEE Internet Comput..
[11] Elisa Bertino,et al. On specifying security policies for web documents with an XML-based language , 2001, SACMAT '01.
[12] Bhavani M. Thuraisingham,et al. The Use of Conceptual Structures for Handling the Inference Problem , 1991, DBSec.
[13] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[14] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[15] Elisa Bertino,et al. A temporal key management scheme for secure broadcasting of XML documents , 2002, CCS '02.