- 2011
- Spiridon Bakiras
, Konstantinos F. Nikolopoulos
:
Adjusting the Trade-Off between Privacy Guarantees and Computational Cost in Secure Hardware PIR. Secure Data Management 2011: 128-144 - Mishtu Banerjee, Rosa Karimi Adl, Leanne Wu, Ken Barker:
Quantifying Privacy Violations. Secure Data Management 2011: 1-17 - Christoph Bösch, Richard Brinkman, Pieter H. Hartel
, Willem Jonker:
Conjunctive Wildcard Search over Encrypted Data. Secure Data Management 2011: 114-127 - Alina Campan, Nicholas Cooper, Traian Marius Truta:
On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited. Secure Data Management 2011: 18-32 - Haksoo Choi, Supriyo Chakraborty, Zainul Charbiwala, Mani B. Srivastava
:
SensorSafe: A Framework for Privacy-Preserving Management of Personal Sensory Information. Secure Data Management 2011: 85-100 - Dmitri Jarnikov, Jeroen Doumen:
Watermarking for Adaptive Streaming Protocols. Secure Data Management 2011: 101-113 - Milan Petkovic, Davide Prandi
, Nicola Zannone
:
Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168 - Nayot Poolsappasit, Vimal Kumar
, Sanjay Madria, Sriram Chellappan:
Challenges in Secure Sensor-Cloud Computing. Secure Data Management 2011: 70-84 - Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi:
A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud. Secure Data Management 2011: 52-69 - Qian Xiao
, Zhengkui Wang, Kian-Lee Tan
:
LORA: Link Obfuscation by Randomization in Graphs. Secure Data Management 2011: 33-51 - Willem Jonker, Milan Petkovic:
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings. Lecture Notes in Computer Science 6933, Springer 2011, ISBN 978-3-642-23555-9 [contents] - 2010
- Giampaolo Armellin, Dario Betti, Fabio Casati, Annamaria Chiasera, Gloria Martínez, Jovan Stevovic
:
Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems. Secure Data Management 2010: 54-69 - Elisa Bertino, Hyo-Sang Lim:
Assuring Data Trustworthiness - Concepts and Research Challenges. Secure Data Management 2010: 1-12 - Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
, Jan Jürjens:
Towards the Secure Modelling of OLAP Users' Behaviour. Secure Data Management 2010: 101-112 - Alina Campan, Nicholas Cooper:
On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization. Secure Data Management 2010: 13-25 - Bogdan Carbunar, Radu Sion:
Joining Privately on Outsourced Data. Secure Data Management 2010: 70-86 - Assadarat Khurat, Dieter Gollmann, Joerg Abendroth:
A Formal P3P Semantics for Composite Services. Secure Data Management 2010: 113-131 - Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel
, Willem Jonker:
Computationally Efficient Searchable Symmetric Encryption. Secure Data Management 2010: 87-100 - Phuong Huynh Van Quoc, Tran Khanh Dang
:
eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss. Secure Data Management 2010: 26-40 - Amit Sachan
, Sabu Emmanuel, Mohan S. Kankanhalli:
A Geometric Approach for Efficient Licenses Validation in DRM. Secure Data Management 2010: 132-149 - Yonghui Xiao, Li Xiong
, Chun Yuan:
Differentially Private Data Release through Multidimensional Partitioning. Secure Data Management 2010: 150-168 - Ran Yahalom, Erez Shmueli, Tomer Zrihen:
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach. Secure Data Management 2010: 41-53 - Willem Jonker, Milan Petkovic:
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Lecture Notes in Computer Science 6358, Springer 2010, ISBN 978-3-642-15545-1 [contents] - 2009
- Mustafa Canim, Murat Kantarcioglu, Ali Inan:
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. Secure Data Management 2009: 1-16 - Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham:
Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 - Abdessamad Imine, Asma Cherif, Michaël Rusinowitch:
A Flexible Access Control Model for Distributed Collaborative Editors. Secure Data Management 2009: 89-106 - Lazaros Koromilas, George Chinis, Irini Fundulaki, Sotiris Ioannidis:
Controlling Access to XML Documents over XML Native and Relational Databases. Secure Data Management 2009: 122-141 - Sergio Mascetti
, Claudio Bettini
, Dario Freni:
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity. Secure Data Management 2009: 142-157 - Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han:
An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88