- Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas:
An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 - Birgit Pfitzmann:
Multi-layer Audit of Access Rights. Secure Data Management 2007: 18-32 - Nataliya Rassadko:
Query Rewriting Algorithm Evaluation for XML Security Views. Secure Data Management 2007: 64-80 - Traian Marius Truta, Alina Campan, Paul Meyer:
Generating Microdata with P -Sensitive K -Anonymity Property. Secure Data Management 2007: 124-141 - Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123 - Willem Jonker, Milan Petkovic:
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings. Lecture Notes in Computer Science 4721, Springer 2007, ISBN 978-3-540-75247-9 [contents] - 2006
- Xiangdong An, Dawn N. Jutla, Nick Cercone:
Temporal Context Lie Detection and Generation. Secure Data Management 2006: 30-47 - Stefan Böttcher, Sebastian Obermeier:
Sovereign Information Sharing Among Malicious Partners. Secure Data Management 2006: 18-29 - Stefan Böttcher, Rita Steinmetz:
Information Disclosure by XPath Queries. Secure Data Management 2006: 160-174 - Changwoo Byun, Seog Park:
Two Phase Filtering for XML Access Control. Secure Data Management 2006: 115-130 - Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee:
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83 - Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li:
Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 - Amir H. Chinaei, Huaxin Zhang:
Hybrid Authorizations and Conflict Resolution. Secure Data Management 2006: 131-145 - Hakan Hacigümüs:
SPIDER: An Autonomic Computing Approach to Database Security Management. Secure Data Management 2006: 175-183 - Ulrich Kühn:
Analysis of a Database and Index Encryption Scheme - Problems and Fixes. Secure Data Management 2006: 146-159 - P. Krishna Prasad, C. Pandu Rangan:
Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases. Secure Data Management 2006: 84-99 - Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee:
Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74 - Yunyu Song, Sylvia L. Osborn:
Conflict of Interest in the Administrative Role Graph Model. Secure Data Management 2006: 100-114 - Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 - Willem Jonker, Milan Petkovic:
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings. Lecture Notes in Computer Science 4165, Springer 2006, ISBN 978-3-540-38984-2 [contents] - 2005
- Claudio Bettini
, Xiaoyang Sean Wang, Sushil Jajodia:
Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199 - Stefan Böttcher, Rita Steinmetz:
Detecting Privacy Violations in Sensitive XML Databases. Secure Data Management 2005: 143-154 - Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing. Secure Data Management 2005: 33-46 - Amir H. Chinaei, Frank Wm. Tompa:
User-Managed Access Control for Health Care Systems. Secure Data Management 2005: 63-72 - Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia, Stefano Paraboschi
, Pierangela Samarati
:
Metadata Management in Outsourced Encrypted Databases. Secure Data Management 2005: 16-32 - Boris Dragovic, Calicrates Policroniades:
Information SeeSaw: Availability vs. Security Management in the UbiComp World. Secure Data Management 2005: 200-216 - Alban Gabillon:
A Formal Access Control Model for XML Databases. Secure Data Management 2005: 86-103 - Hakan Hacigümüs, Sharad Mehrotra:
Efficient Key Updates in Encrypted Database Systems. Secure Data Management 2005: 1-15 - Ayça Azgin Hintoglu, Yücel Saygin:
Suppressing Microdata to Prevent Probabilistic Classification Based Inference. Secure Data Management 2005: 155-169 - Cecilia Ionita, Sylvia L. Osborn:
Specifying an Access Control Model for Ontologies for the Semantic Web. Secure Data Management 2005: 73-85