Databases Reference
In-Depth Information
International Conference on Very Large Databases , Toronto, Canada, August
2004.
9. President's Information Technology Advisory Committee, Revolutionizing
Health Care through Information Technology, Report to the President of the
United States, June 2004.
10. R.. Motwani, S. Nabar, D, Thomas, “Auditing SQL Queries,” Third Interna-
tional Workshop on Privacy Data Management, in conjunction with the 23rd
International Conference on Data Engineering (ICDE 2007), April, 2007, Istan-
bul, Turkey.
11. R. Agrawal, A. Evfimievski, J. Kiernan, R. Velu, “Auditing Disclosure by Rel-
evance Ranking,” to appear in Proceedings of the 26th ACM SIGMOD Intl
Conference on Management of Data , Beijing, China, June 2007.
12. T. Ager, C. Johnson, J. Kiernan, “Policy-Based Management and Sharing of
Sensitive Information among Government Agencies,” Proceedings of the 25th
IEEE Military Communications Conference (MILCOM) , Washington DC, USA,
October 2006.
13. R. Agrawal, A. Evfimievski, R. Srikant. “Information Sharing across Private
Databases,” Proceedings of the ACM SIGMOD Conference on Management of
Data , San Diego, California. June 2003.
14. R. Agrawal, D. Asonov, M. Kantarcioglu, Y. Li, “Sovereign Joins,” Proceedings
of the 22nd International Conference on Data Engineering, Atlanta, Georgia,
USA, April 2006.
15. R. Agrawal, E. Terzi, “On Honesty in Sovereign Information Sharing,” Proceed-
ings of the 10th International Conference on Extending Database Technology ,
Munich, Germany, March 2006.
16. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order-Preserving Encryption
for Numeric Data,” Proceedings of the ACM SIGMOD Conference on Manage-
ment of Data , Paris, France, June 2004.
17. B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, Y. Wu, “A Framework for Ef-
ficient Storage Security in RDBMS,” In Proceedings of the 9th International
Conference on Extending DataBase Technology (EDBT 2004) , Heraklion, Crete,
Greece, March 2004.
18. L. Cranor, M. Langheinrich, M. Manchiori, M. Presler-Marshall, J. Reagle, Plat-
form for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation,
2002.
19. R. Agrawal, C. Johnson, “Securing Electronic Health Records without Impeding
the Flow of Information,” International Journal of Medical Informatics , Vol. 76,
Nos. 5-6, May-June 2007.
20. A. Rosenthal, M. Winslett, “Security of Shared Data in Large Systems: State of
the Art and Research Directions”. Proc. of the 30th Int'l Conf. on Very Large
Databases , Toronto, Canada, August 2004.
21. T. Ager, C. Johnson, J. Kiernan, “Policy-Based Management and Sharing of
Sensitive Information among Government Agencies,” Proceedings of the 25th
IEEE Military Communications Conference (MILCOM) , Washington DC, USA,
October 2006.
22. G. Miklau and D. Suciu, “A Formal Analysis of Information Disclosure in Data
Exchange,” Proceedings. of the ACM SIGMOD International Conference on
Management of Data , Paris, France, June 2004.
Search WWH ::




Custom Search