Databases Reference
In-Depth Information
12. Mercurytechnology.com Managed Services for Oracle Systems.
Online at
http://www.mercurytechnology.com .
13. Neospire.net
Managed
Hosting
for
Corporate
E-business.
Online
at
http://www.neospire.net .
14. Netnation.com Microsoft SQL Hosting. Online at http://www.netnation.com .
15. Opendb.com Web Database Hosting. Online at http://www.opendb.com .
16. Oracle:
Database
Encryption
in
Oracle
10g.
Online
at
http://www.oracle.com/database .
17. The
IBM
WebSphere
Information
Integrator.
Online
at
http://www.ibm.com/software/data/integration .
18. IBM
4758
PCI
Cryptographic
Coprocessor.
Online
at
http://www-03.ibm.com/security/cryptocards/pcicc/overview.shtml ,
2006.
19. IBM
4764
PCI-X
Cryptographic
Coprocessor
(PCIXCC).
Online
at
http://www-03.ibm.com/security/cryptocards/pcixcc/overview.shtml ,
2006.
20. IBM
Common
Cryptographic
Architecture
(CCA)
API.
Online
at
http://www-03.ibm.com/security/cryptocards//pcixcc/overcca.shtml ,
2006.
21. IBM
Cryptographic
Hardware.
Online
at
http://www-03.ibm.com/security/products/ , 2006.
22. Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A
calculus for access control in distributed systems. ACM Trans. Program. Lang.
Syst. , 15(4):706-734, 1993.
23. Andre Adelsbach and Ahmad Sadeghi. Advanced techniques for dispute resolv-
ing and authorship proofs on digital works. In Proceedings of SPIE Electronic
Imaging , 2003.
24. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hip-
pocratic databases. In Proceedings of the International Conference on Very
Large Databases VLDB , pages 143-154, 2002.
25. Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining.
In Proceedings of the ACM SIGMOD , pages 439-450, 2000.
26. M. Bellare and D. Micciancio. A new paradigm for collision-free hashing:
Incrementality at reduced cost. In Proceedings of EuroCrypt , 1997.
27. Steven M. Bellovin. Spamming, phishing, authentication, and privacy. Com-
munications of the ACM , 47(12):144, 2004.
28. E. Bertino. Data hiding and security in an object-oriented database system.
In Proceedings of the 8th IEEE International Conference on Data Engineering ,
1992.
29. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti.
Author-X: A Java-Based System for XML Data Protection. In IFIP Workshop
on Database Security , pages 15-26, 2000.
30. Elisa Bertino, Barbara Carminati, and Elena Ferrari. A temporal key manage-
ment scheme for secure broadcasting of xml documents. In Proceedings of the
9th ACM conference on Computer and communications security , pages 31-40,
2002.
31. Elisa Bertino, Sushil Jajodia, and Pierangela Samarati. A flexible authorization
mechanism for relational data management systems. ACM Transactions on
Information Systems , 17(2), 1999.
Search WWH ::




Custom Search