Databases Reference
In-Depth Information
103. Fabian Monrose and Aviel D. Rubin. Keystroke dynamics as a biometric for
authentication.
Future Generation Computer Systems
, 16(4):351-359, 2000.
104. E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity
in outsourced databases. In
ISOC Symposium on Network and Distributed
Systems Security NDSS
, 2004.
105. Roger M. Needham and Michael D. Schroeder. Using encryption for authenti-
cation in large networks of computers.
Commun. ACM
, 21(12):993-999, 1978.
106. M. Nyanchama and S. L. Osborn. Access rights administration in role-based
security systems. In
Proceedings of the IFIP Workshop on Database Security
,
pages 37-56, 1994.
107. Sylvia L. Osborn. Database security integration using role-based access control.
In
Proceedings of the IFIP Workshop on Database Security
, pages 245-258,
2000.
108. HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge com-
puting. In
ICDE '04: Proceedings of the 20th International Conference on Data
Engineering
, page 560, Washington, DC, USA, 2004. IEEE Computer Society.
109. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In
Proceedings of the First USENIX Conference on File and Storage Technologies
(FAST 2002)
, pages 89-101, Monterey, CA, January 2002. USENIX Associa-
tion.
110. David
Rasikan,
Sang
H.
Son,
and
Ravi
Mukkamala.
Support-
ing
security
requirements
in
multilevel
real-time
databases,
cite-
seer.nj.nec.com/david95supporting.html, 1995.
111. Shariq Rizvi, Alberto Mendelzon, S. Sudarshan, and Prasan Roy. Extending
query rewriting techniques for fine-grained access control. In
Proceedings of the
2004 ACM SIGMOD international conference on Management of data
, pages
551-562. ACM Press, 2004.
112. Ravi S. Sandhu. On five definitions of data integrity. In
Proceedings of the
IFIP Workshop on Database Security
, pages 257-267, 1993.
113. B. Schneier.
Applied Cryptography: Protocols, Algorithms and Source Code in
C
. Wiley & Sons, 1996.
114. Radu Sion. Query execution assurance for outsourced databases. In
Proceedings
of the Very Large Databases Conference VLDB
, 2005.
115. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Relational data rights pro-
tection through watermarking.
IEEE Transactions on Knowledge and Data
Engineering TKDE
, 16(6), June 2004.
116. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for cate-
gorical data.
IEEE Transactions on Knowledge and Data Engineering TKDE
,
2005.
117. Radu Sion and Bogdan Carbunar. Indexed Keyword Search with Privacy and
Query Completeness, 2005. Stony Brook Network Security and Applied Cryp-
tography Lab Tech Report 2005-07.
118. Radu Sion and Bogdan Carbunar. On the Computational Practicality of Pri-
vate Information Retrieval. In
Proceedings of the Network and Distributed Sys-
tems Security Symposium
, 2007. Stony Brook Network Security and Applied
Cryptography Lab Tech Report 2006-06.
119. G.
Sivathanu,
C.
P.
Wright,
and
E.
Zadok.
Enhancing
File
Sys-
tem
Integrity
Through
Checksums.
Technical
Report
FSL-04-04,
Computer
Science
Department,
Stony
Brook
University,
May
2004.