Databases Reference
In-Depth Information
7. H. Guo, Y. Li, and S. Jajodia. Chaining watermarks for detecting malicious
modifications to streaming data. Inf. Sci. , 177(1):281-298, 2007.
8. H. Guo, Y. Li, A. Liu, and S. Jajodia. A fragile watermarking scheme for
detecting malicious modifications of database relations. Inf. Sci. , 176(10):1350-
1378, 2006.
9. J. Guo, Y. Li, R. H. Deng, and K. Chen. Rights protection for data cubes. In
ISC , pages 359-372, 2006.
10. N.F. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and
Watermarking-Attacks and Countermeasures . Kluwer Publishers, 2000.
11. S. Katzenbeisser and F.A. Petitcolas, editors. Information Hiding Techniques
for Steganography and Digital Watermarking . Artech House, 2000.
12. Y. Li and R. H. Deng. Publicly verifiable ownership protection for relational
databases. In ASIACCS , pages 78-89, 2006.
13. Y. Li, H. Guo, and S. Jajodia. Tamper detection and localization for categorical
data using fragile watermarks. In Digital Rights Management Workshop , pages
73-82, 2004.
14. Y. Li, V. Swarup, and S. Jajodia. Constructing a virtual primary key for fin-
gerprinting relational data.
In Digital Rights Management Workshop , pages
133-141, 2003.
15. Y. Li, V. Swarup, and S. Jajodia. A robust watermarking scheme for relational
data. In Proceedings of the 13th Workshop on Information Technology and
Systems (WITS) , pages 195-200, December 2003.
16. Y. Li, V. Swarup, and S. Jajodia. Defending against additive attacks with
maximal errors in watermarking relational databases. In Proc. the 18th Annual
IFIP WG 11.3 Working Conference on Data and Applications Security , pages
81-94, 2004.
17. Y. Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes
and specialties. IEEE Transactions on Dependable and Secure Computing , 2:34-
45, 2005.
18. S. Micali. Ecient certificate revocation. In Technical Report: TM-542b. Mas-
sachusetts Institute of Technology. Cambridge, MA, USA, 1996.
19. W. J. Myrvold and F. Ruskey. Ranking and unranking permutations in linear
time. Inf. Process. Lett. , 79(6):281-284, 2001.
20. W. Ng and H. L. Lau. Effective approaches for watermarking xml data. In
DASFAA , pages 68-80, 2005.
21. R. Sion. Proving ownership over categorical data. In Proceedings of IEEE
International Conference on Data Engineering , pages 584-596, 2004.
22. R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data.
In Proceedings of ACM SIGMOD International Conference on Management of
Data , pages 98-108, 2003.
23. R. Sion, M. Atallah, and S. Prabhakar. Resilient rights protection for sensor
streams. In Proceedings of the Very Large Databases Conference , pages 732-743,
2004.
24. L. Vaas.
Putting a stop to database piracy.
eWEEK, enterprise news and
reviews , September 24, 2003.
http://www.eweek.com/print article/0,3048,a=107965,00.asp.
25. X. Zhou, Pang H. H., and K. L. Tan. Query-based watermarking for xml data.
In ASIACCS , pages 253-264, 2007.
Search WWH ::




Custom Search