Databases Reference
In-Depth Information
50. Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep
Vaidya, Ahmed Elmagarmid, and Dan Suciu. Privacy-preserving data integra-
tion and sharing. In
The 9th ACM SIGMOD workshop on Research issues in
data mining and knowledge discovery
, pages 19-26. ACM Press, 2004.
51. Chris Clifton and Don Marks. Security and privacy implications of data min-
ing. In
Workshop on Data Mining and Knowledge Discovery
, pages 15-19,
Montreal, Canada, 1996. Computer Sciences, University of British Columbia.
January 2006.
53. Premkumar T. Devanbu, Michael Gertz, April Kwong, Chip Martel, G. Nuck-
olls, and Stuart G. Stubblebine. Flexible authentication of XML documents. In
ACM Conference on Computer and Communications Security
, pages 136-145,
2001.
54. Premkumar T. Devanbu, Michael Gertz, Chip Martel, and Stuart G. Stub-
blebine.
Authentic third-party data publication.
In
IFIP Workshop on
Database Security
, pages 101-112, 2000.
55. W. Du and M. J. Atallah. Protocols for secure remote database access with
approximate matching. In
Proceedings of the 1st ACM Workshop on Security
and Privacy in E-Commerce
, 2000.
56. Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van
Doorn, Sean W. Smith, and Steve Weingart. Building the ibm 4758 secure
coprocessor.
Computer
, 34(10):57-66, 2001.
57. Einar Mykletun and Maithili Narasimha and Gene Tsudik. Signature Bou-
quets: Immutability for Aggregated/Condensed Signatures. In
Proceedings of
the European Symposium on Research in Computer Security ESORICS
, pages
160-176, 2004.
58. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, and
Rebecca N. Wright. Secure multiparty computation of approximations. In
ICALP '01: Proceedings of the 28th International Colloquium on Automata,
Languages and Programming,
, pages 927-938, 2001.
59. M. Freedman, K. Nissim, and B. Pinkas. Ecient private matching and set
intersection. In
In Advances in Cryptology EUROCRYPT
, pages 1-19, 2004.
60. Irini Fundulaki and Maarten Marx. Specifying access control policies for xml
documentswithxpath. In
The ACM Symposium on Access Control Models
and Technologies
, pages 61-69. ACM Press, 2004.
61. Gartner, Inc. Server Storage and RAID Worldwide. Technical report, Gartner
62. S. Ghemawat, H. Gobioff, and S. T. Leung. The Google File System. In
Pro-
ceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP
'03)
, pages 29-43, Bolton Landing, NY, October 2003. ACM SIGOPS.
63. Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikinen. On private
scalar product computation for privacy-preserving data mining.
In
ICISC
,
pages 104-120, 2004.
64. E. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003.
65. O. Goldreich.
Foundations of Cryptography
. Cambridge University Press, 2001.
66. P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over
encrypted data. In
Proceedings of ACNS
, pages 31-45. Springer-Verlag; Lecture
Notes in Computer Science 3089, 2004.