Databases Reference
In-Depth Information
103. Fabian Monrose and Aviel D. Rubin. Keystroke dynamics as a biometric for
authentication. Future Generation Computer Systems , 16(4):351-359, 2000.
104. E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity
in outsourced databases. In ISOC Symposium on Network and Distributed
Systems Security NDSS , 2004.
105. Roger M. Needham and Michael D. Schroeder. Using encryption for authenti-
cation in large networks of computers. Commun. ACM , 21(12):993-999, 1978.
106. M. Nyanchama and S. L. Osborn. Access rights administration in role-based
security systems. In Proceedings of the IFIP Workshop on Database Security ,
pages 37-56, 1994.
107. Sylvia L. Osborn. Database security integration using role-based access control.
In Proceedings of the IFIP Workshop on Database Security , pages 245-258,
2000.
108. HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge com-
puting. In ICDE '04: Proceedings of the 20th International Conference on Data
Engineering , page 560, Washington, DC, USA, 2004. IEEE Computer Society.
109. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In
Proceedings of the First USENIX Conference on File and Storage Technologies
(FAST 2002) , pages 89-101, Monterey, CA, January 2002. USENIX Associa-
tion.
110. David
Rasikan,
Sang
H.
Son,
and
Ravi
Mukkamala.
Support-
ing
security
requirements
in
multilevel
real-time
databases,
cite-
seer.nj.nec.com/david95supporting.html, 1995.
111. Shariq Rizvi, Alberto Mendelzon, S. Sudarshan, and Prasan Roy. Extending
query rewriting techniques for fine-grained access control. In Proceedings of the
2004 ACM SIGMOD international conference on Management of data , pages
551-562. ACM Press, 2004.
112. Ravi S. Sandhu. On five definitions of data integrity. In Proceedings of the
IFIP Workshop on Database Security , pages 257-267, 1993.
113. B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in
C . Wiley & Sons, 1996.
114. Radu Sion. Query execution assurance for outsourced databases. In Proceedings
of the Very Large Databases Conference VLDB , 2005.
115. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Relational data rights pro-
tection through watermarking. IEEE Transactions on Knowledge and Data
Engineering TKDE , 16(6), June 2004.
116. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for cate-
gorical data. IEEE Transactions on Knowledge and Data Engineering TKDE ,
2005.
117. Radu Sion and Bogdan Carbunar. Indexed Keyword Search with Privacy and
Query Completeness, 2005. Stony Brook Network Security and Applied Cryp-
tography Lab Tech Report 2005-07.
118. Radu Sion and Bogdan Carbunar. On the Computational Practicality of Pri-
vate Information Retrieval. In Proceedings of the Network and Distributed Sys-
tems Security Symposium , 2007. Stony Brook Network Security and Applied
Cryptography Lab Tech Report 2006-06.
119. G.
Sivathanu,
C.
P.
Wright,
and
E.
Zadok.
Enhancing
File
Sys-
tem
Integrity
Through
Checksums.
Technical
Report
FSL-04-04,
Computer
Science
Department,
Stony
Brook
University,
May
2004.
www.fsl.cs.sunysb.edu/docs/nc-checksum-tr/nc-checksum.pdf .
Search WWH ::




Custom Search