- Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin:
Database Intrusion Detection Using Role Profiling with Role Hierarchy. Secure Data Management 2009: 33-48 - Jing Zhang, Adriane Chapman, Kristen LeFevre:
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. Secure Data Management 2009: 17-32 - Lei Zhang, Lingyu Wang, Sushil Jajodia
, Alexander Brodsky:
L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 - Willem Jonker, Milan Petkovic:
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings. Lecture Notes in Computer Science 5776, Springer 2009, ISBN 978-3-642-04218-8 [contents] - 2008
- Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya
:
A Trusted Approach to E-Commerce. Secure Data Management 2008: 119-132 - Claudio Bettini
, Xiaoyang Sean Wang, Sushil Jajodia:
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15 - Annamaria Chiasera, Fabio Casati
, Florian Daniel
, Yannis Velegrakis
:
Engineering Privacy Requirements in Business Intelligence Applications. Secure Data Management 2008: 219-228 - Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu:
An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98 - Mohamed R. Fouad, Guy Lebanon, Elisa Bertino:
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Secure Data Management 2008: 32-49 - Gabriele Gianini
, Ernesto Damiani
:
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. Secure Data Management 2008: 133-150 - Vikram Goyal, Shyam K. Gupta, Manish Singh, Anand Gupta:
Auditing Inference Based Disclosures in Dynamic Databases. Secure Data Management 2008: 67-81 - Luan Ibraimi, Qiang Tang, Pieter H. Hartel
, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Secure Data Management 2008: 185-198 - Ashish Kamra, Elisa Bertino, Rimma V. Nehme:
Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66 - Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke
:
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. Secure Data Management 2008: 99-118 - Jian Li, William K. Cheung
:
Query Rewriting for Access Control on Semantic Web. Secure Data Management 2008: 151-168 - Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang:
A Methodology for Bridging between RBAC and an Arbitrary Application Program. Secure Data Management 2008: 199-208 - Mark Slaymaker
, David J. Power, Douglas Russell, Andrew Simpson
:
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. Secure Data Management 2008: 169-184 - Lei Zhang, Sushil Jajodia, Alexander Brodsky:
Simulatable Binding: Beyond Simulatable Auditing. Secure Data Management 2008: 16-31 - Willem Jonker, Milan Petkovic:
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2 [contents] - 2007
- Rafae Bhatti, Tyrone Grandison:
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. Secure Data Management 2007: 158-173 - Martin Boldt
, Bengt Carlsson, Tobias Larsson, Niklas Lindén:
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. Secure Data Management 2007: 142-157 - Alexander Brodsky, Lei Zhang, Sushil Jajodia:
Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. Secure Data Management 2007: 81-95 - Weiwei Cheng, Kian-Lee Tan
:
Authenticating kNN Query Results in Data Publishing. Secure Data Management 2007: 47-63 - Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa:
A Unified Conflict Resolution Algorithm. Secure Data Management 2007: 1-17 - M. A. C. Dekker, Sandro Etalle:
Refinement for Administrative Policies. Secure Data Management 2007: 33-46 - Josep Domingo-Ferrer:
A Three-Dimensional Conceptual Framework for Database Privacy. Secure Data Management 2007: 193-202 - Ragib Hasan
, Marianne Winslett, Radu Sion:
Requirements of Secure Storage Systems for Healthcare Records. Secure Data Management 2007: 174-180 - Xin Jin, Sylvia L. Osborn:
Architecture for Data Collection in Database Intrusion Detection Systems. Secure Data Management 2007: 96-107 - Nai-Wei Lo, Kuo-Hui Yeh:
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. Secure Data Management 2007: 203-212