Databases Reference
In-Depth Information
67. Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In
Proceedings of the 2001 Conference on Topics in Cryptology , pages 425-440.
Springer-Verlag, 2001.
68. Li Gong. Ecient network authentication protocols: lower bounds and optimal
implementations. Distrib. Comput. , 9(3):131-145, 1995.
69. David Gross-Amblard. Query-preserving watermarking of relational databases
and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-
SIGACT-SIGART Symposium on Principles of Database Systems , pages 191-
201, New York, NY, USA, 2003. ACM Press.
70. P.
C.
Gutmann.
Secure
filesystem
(SFS)
for
DOS/Windows.
www.cs.auckland.ac.nz/ ~ pgut001/sfs/index.html , 1994.
71. H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted
data in the database-service-provider model. In Proceedings of the ACM SIG-
MOD international conference on Management of data , pages 216-227. ACM
Press, 2002.
72. H. Hacigumus, B. R. Iyer, and S. Mehrotra. Providing database as a service.
In IEEE International Conference on Data Engineering (ICDE) , 2002.
73. J. Hale, J. Threet, and S. Shenoi. A framework for high assurance security of
distributed objects, 1997.
74. J. S. Heidemann and G. J. Popek. File system development with stackable
layers. ACM Transactions on Computer Systems , 12(1):58-89, February 1994.
75. E. Hildebrandt and G. Saake. User Authentication in Multidatabase Systems.
In R. R. Wagner, editor, Proceedings of the Ninth International Workshop on
Database and Expert Systems Applications, August 26-28, 1998, Vienna, Aus-
tria , pages 281-286, Los Alamitos, CA, 1998. IEEE Computer Society Press.
76. B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range
queries. In Proceedings of ACM SIGMOD , 2004.
77. HweeHwa Pang and Arpit Jain and Krithi Ramamritham and Kian-Lee Tan.
Verifying Completeness of Relational Query Results in Data Publishing. In
Proceedings of ACM SIGMOD , 2005.
78. Piotr Indyk and David Woodruff. Private polylogarithmic approximations and
ecient matching. In Theory of Cryptography Conference , 2006.
79. S. Jajodia, P. Samarati, and V. S. Subrahmanian. A Logical Language for Ex-
pressing Authorizations. In IEEE Symposium on Security and Privacy , pages
31-42, Oakland, CA, May 04-07 1997. IEEE Press.
80. S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for
expressing authorizations. In IEEE Symposium on Security and Privacy. Oak-
land, CA , pages 31-42, 1997.
81. S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified frame-
work for enforcing multiple access control policies. In SIGMOD , 1997.
82. Jetico, Inc. BestCrypt software home page. www.jetico.com , 2002.
83. A. Kashyap, S. Patil, G. Sivathanu, and E. Zadok. I3FS: An In-Kernel In-
tegrity Checker and Intrusion Detection File System. In Proceedings of the 18th
USENIX Large Installation System Administration Conference (LISA 2004) ,
pages 69-79, Atlanta, GA, November 2004. USENIX Association.
84. G. Kim and E. Spafford. Experiences with Tripwire: Using Integrity Checkers
for Intrusion Detection. In Proceedings of the Usenix System Administration,
Networking and Security (SANS III) , 1994.
Search WWH ::




Custom Search