Databases Reference
In-Depth Information
50. Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep
Vaidya, Ahmed Elmagarmid, and Dan Suciu. Privacy-preserving data integra-
tion and sharing. In The 9th ACM SIGMOD workshop on Research issues in
data mining and knowledge discovery , pages 19-26. ACM Press, 2004.
51. Chris Clifton and Don Marks. Security and privacy implications of data min-
ing. In Workshop on Data Mining and Knowledge Discovery , pages 15-19,
Montreal, Canada, 1996. Computer Sciences, University of British Columbia.
52. CNN. Feds seek Google records in porn probe. Online at http://www.cnn.com ,
January 2006.
53. Premkumar T. Devanbu, Michael Gertz, April Kwong, Chip Martel, G. Nuck-
olls, and Stuart G. Stubblebine. Flexible authentication of XML documents. In
ACM Conference on Computer and Communications Security , pages 136-145,
2001.
54. Premkumar T. Devanbu, Michael Gertz, Chip Martel, and Stuart G. Stub-
blebine.
Authentic third-party data publication.
In IFIP Workshop on
Database Security , pages 101-112, 2000.
55. W. Du and M. J. Atallah. Protocols for secure remote database access with
approximate matching. In Proceedings of the 1st ACM Workshop on Security
and Privacy in E-Commerce , 2000.
56. Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van
Doorn, Sean W. Smith, and Steve Weingart. Building the ibm 4758 secure
coprocessor. Computer , 34(10):57-66, 2001.
57. Einar Mykletun and Maithili Narasimha and Gene Tsudik. Signature Bou-
quets: Immutability for Aggregated/Condensed Signatures. In Proceedings of
the European Symposium on Research in Computer Security ESORICS , pages
160-176, 2004.
58. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, and
Rebecca N. Wright. Secure multiparty computation of approximations. In
ICALP '01: Proceedings of the 28th International Colloquium on Automata,
Languages and Programming, , pages 927-938, 2001.
59. M. Freedman, K. Nissim, and B. Pinkas. Ecient private matching and set
intersection. In In Advances in Cryptology EUROCRYPT , pages 1-19, 2004.
60. Irini Fundulaki and Maarten Marx. Specifying access control policies for xml
documentswithxpath. In The ACM Symposium on Access Control Models
and Technologies , pages 61-69. ACM Press, 2004.
61. Gartner, Inc. Server Storage and RAID Worldwide. Technical report, Gartner
Group/Dataquest, 1999. www.gartner.com .
62. S. Ghemawat, H. Gobioff, and S. T. Leung. The Google File System. In Pro-
ceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP
'03) , pages 29-43, Bolton Landing, NY, October 2003. ACM SIGOPS.
63. Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikinen. On private
scalar product computation for privacy-preserving data mining.
In ICISC ,
pages 104-120, 2004.
64. E. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003.
http://eprint.iacr.org/2003/216/ .
65. O. Goldreich. Foundations of Cryptography . Cambridge University Press, 2001.
66. P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over
encrypted data. In Proceedings of ACNS , pages 31-45. Springer-Verlag; Lecture
Notes in Computer Science 3089, 2004.
Search WWH ::




Custom Search