Databases Reference
In-Depth Information
55. Atallah, M., Frikken, K., Blanton, M.: Dynamic and ecient key management
for access hierarchies. In: Proc. of the 12th ACM conference on Computer and
Communications Security (CCS05), Alexandria, VA, USA (2005)
56. Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi,
S., Samarati, P.: Selective data encryption in outsourced dynamic environments.
In: Proc. of the Second International Workshop on Views On Designing Com-
plex Architectures (VODCA 2006). Electronic Notes in Theoretical Computer
Science, Bertinoro, Italy, Elsevier (2006)
57. Wang, H., Lakshmanan, L.V.S.: Ecient secure query evaluation over encrypted
XML databases. In: Proc. of the 32nd VLDB Conference, Seoul, Korea (Septem-
ber 2006)
Search WWH ::




Custom Search