


default search action
Handbook of Database Security 2008
- Michael Gertz, Sushil Jajodia:

Handbook of Database Security - Applications and Trends. Springer 2008, ISBN 978-0-387-48532-4 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Pierangela Samarati
:
Recent Advances in Access Control. 1-26 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Stefano Paraboschi
, Pierangela Samarati
:
Access Control Models for XML. 27-53 - Naizhen Qi, Michiharu Kudo:

Access Control Policy Languages in XML. 55-71 - Dongyi Li, William H. Winsborough, Marianne Winslett, Ragib Hasan

:
Database Issues in Trust Management and Trust Negotiation. 73-113 - Feifei Li, Marios Hadjieleftheriou, George Kollios, Leonid Reyzin:

Authenticated Index Structures for Outsourced Databases. 115-136 - Radu Sion:

Towards Secure Data Outsourcing. 137-161 - Bijit Hore, Sharad Mehrotra, Hakan Hacigümüs:

Managing and Querying Encrypted Data. 163-190 - Lingyu Wang, Sushil Jajodia:

Security in Data Warehouses and OLAP Systems. 191-212 - Vijayalakshmi Atluri

, Janice Warner:
Security for Workflow Systems. 213-230 - Bhavani Thuraisingham:

Secure Semantic Web Services. 231-245 - Soon Ae Chun

, Vijayalakshmi Atluri
:
Geospatial Database Security. 247-266 - Michael Gertz, Madhavi Gandhi:

Security Re-engineering for Databases: Concepts and Techniques. 267-296 - Radu Sion:

Database Watermarking for Copyright Protection. 297-328 - Yingjiu Li:

Database Watermarking: A Systematic View. 329-355 - Ragib Hasan

, Marianne Winslett, Soumyadeb Mitra, Windsor W. Hsu, Radu Sion:
Trustworthy Records Retention. 357-381 - Peng Liu, Sushil Jajodia, Meng Yu:

Damage Quarantine and Recovery in Data Processing Systems. 383-407 - Tyrone Grandison

, Christopher M. Johnson, Jerry Kiernan:
Hippocratic Databases: Current Capabilities and Future Trends. 409-429 - Charu C. Aggarwal, Philip S. Yu:

Privacy-Preserving Data Mining: A Survey. 431-460 - Alin Deutsch:

Privacy in Database Publishing: A Bayesian Perspective. 461-487 - Yufei Tao

:
Privacy Preserving Publication: Anonymization Frameworks and Principles. 489-508 - Claudio Bettini

, Sergio Mascetti
, Xiaoyang Sean Wang:
Privacy Protection through Anonymity in Location-based Services. 509-530 - Claudio A. Ardagna

, Marco Cremonini
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
Privacy-enhanced Location-based Access Control. 531-552 - Vijayalakshmi Atluri

, Heechang Shin:
Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment. 553-573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














