Databases Reference
In-Depth Information
85. G. Kim and E. Spafford. The Design and Implementation of Tripwire: A
File System Integrity Checker. In Proceedings of the 2nd ACM Conference on
Computer Commuications and Society (CCS) , November 1994.
86. E. Kushilevitz and R. Ostrovsky. Replication is not needed: single database,
computationally-private information retrieval. In Proceedings of FOCS . IEEE
Computer Society, 1997.
87. E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sucient
for non-trivial single-server private information retrieval.
In Proceedings of
EUROCRYPT , 2000.
88. Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wob-
ber. Authentication in distributed systems: theory and practice. ACM Trans.
Comput. Syst. , 10(4):265-310, 1992.
89. Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan,
Yirong Xu, and David J. DeWitt. Limiting disclosure in hippocratic databases.
In Proceedings of the International Conference on Very Large Databases VLDB ,
pages 108-119, 2004.
90. Li, Feigenbaum, and Grosof. A logic-based knowledge representation for au-
thorization with delegation. In PCSFW: Proceedings of the 12th Computer
Security Foundations Workshop , 1999.
91. J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure Untrusted Data Repos-
itory (SUNDR). In Proceedings of the 6th Symposium on Operating Systems
Design and Implementation (OSDI 2004) , pages 121-136, San Francisco, CA,
December 2004. ACM SIGOPS.
92. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme
for relational data. In Proceedings of the Workshop on Information Technology
and Systems (WITS) , pages 195-200, 2003.
93. H. Lipmaa. An oblivious transfer protocol with log-squared communication.
Cryptology ePrint Archive, 2004.
94. Maithili Narasimha and Gene Tsudik. DSAC: integrity for outsourced
databases with signature aggregation and chaining. Technical report, 2005.
95. Maithili Narasimha and Gene Tsudik. Authentication of Outsourced Databases
using Signature Aggregation and Chaining. In Proceedings of DASFAA , 2006.
96. E. Mann. Private access to distributed information. Master's thesis, Technion
- Israel Institute of Technology, 1998.
97. C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine.
A general model for authenticated data structures. Technical report, 2001.
98. Charles Martel, Glen Nuckolls, Premkumar Devanbu, Michael Gertz, April
Kwong, and Stuart G. Stubblebine. A general model for authenticated data
structures. Algorithmica , 39(1):21-41, 2004.
99. A. D. McDonald and M. G. Kuhn. StegFS: A Steganographic File System for
Linux. In Information Hiding , pages 462-477, 1999.
100. R. Merkle. Protocols for public key cryptosystems. In IEEE Symposium on
Research in Security and Privacy , 1980.
101. Microsoft Research. Encrypting File System for Windows
2000. Technical report, Microsoft Corporation, July 1999.
www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp .
102. Fabian Monrose and Aviel D. Rubin. Authentication via keystroke dynamics.
In ACM Conference on Computer and Communications Security , pages 48-56,
1997.
Search WWH ::




Custom Search