Fandom

Scratchpad

Security, privacy, and authorization bibliography

215,759pages on
this wiki
Add New Page
Discuss this page0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.


2006

  • Composition and Disclosure of Unlinkable Distributed Databases. Bradley Malin, Latanya Sweeney. ICDE 2006. (poster, data privacy and security)
  • Mondrian Multidimensional K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ICDE 2006. (data privacy and security)
  • Privacy Preserving Query Processing Using Third Parties. Fatih Emekçi, Divyakant Agrawal, Amr El Abbadi, Aziz Gulbeden. ICDE 2006. (data privacy and security)
  • Private Updates to Anonymous Databases. Alberto Trombetta, Elisa Bertino. ICDE 2006. (poster, data privacy and security)
  • Provable Security for Outsourcing Database Operations. Sergei Evdokimov, Matthias Fischmann, Oliver Günther. ICDE 2006. (poster, data privacy and security)
  • Sovereign Joins. Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, Yaping Li. ICDE 2006. (data privacy and security)
  • Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor. ICDE 2006. (poster, data privacy and security)
  • l-Diversity: Privacy Beyond k-Anonymity. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam. ICDE 2006. (data privacy and security)


2005

  • A Framework for High-Accuracy Privacy-Preserving Mining. Shipra Agrawal, Jayant R. Haritsa. ICDE 2005. (privacy-preserving data management)
  • Assuring Security Properties in Third-party Architectures. Barbara Carminati, Elena Ferrari, Elisa Bertino. ICDE 2005. (privacy and security)
  • Automatic Composition of Transition-based Semantic Web Services with Messaging. Daniela Berardi, Diego Calvanese, Giuseppe De Giacomo, Richard Hull, Massimo Mecella. VLDB 2005. (correctness and performance)
  • Checking for k-Anonymity Violation by Views. Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia. VLDB 2005. (privacy)
  • Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, Yiheng Li. ICDE 2005. (privacy and security)
  • Data Privacy through Optimal k-Anonymization. Roberto J. Bayardo Jr., Rakesh Agrawal. ICDE 2005. (privacy-preserving data management)
  • Deriving Private Information from Randomized Data. Zhengli Huang, Wenliang Du, Biao Chen. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Distributed Privacy Preserving Information Sharing. Nan Zhang, Wei Zhao. VLDB 2005. (privacy)
  • Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. Qingbo Zhu, Windsor W. Hsu. ACM SIGMOD Conference 2005. (correctness and trust)
  • Improving Performance of Cluster-based Secure Application Servers with User-level Communication. Jin-Ha Kim, Gyu Sang Choi, Chita R. Das. ICDE 2005. (privacy and security)
  • Incognito: Efficient Full-Domain K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Middleware based Data Replication providing Snapshot Isolation. Yi Lin, Bettina Kemme, Marta Patiño-Martínez, Ricardo Jiménez-Peris. ACM SIGMOD Conference 2005. (correctness and trust)
  • On k-Anonymity and the Curse of Dimensionality. Charu C. Aggarwal. VLDB 2005. (privacy)
  • Parallel Execution of Test Runs for Database Application Systems. Florian Haftmann, Donald Kossmann, Eric Lo. VLDB 2005. (correctness and performance)
  • Practical privacy: the SuLQ framework. Avrim Blum, Cynthia Dwork, Frank McSherry, Kobbi Nissim. PODS 2005. (security and privacy)
  • Privacy and Ownership Preserving of Outsourced Medical Data. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng. ICDE 2005. (privacy and security)
  • Privacy-Preserving Top-K Queries. Jaideep Vaidya, Chris Clifton. ICDE 2005. (privacy and security)
  • Privacy-enhancing k-anonymization of customer data. Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright. PODS 2005. (security and privacy)
  • Query Execution Assurance for Outsourced Databases. Radu Sion. VLDB 2005. (correctness and performance)
  • Security analysis of cryptographically controlled access to XML documents. Martín Abadi, Bogdan Warinschi. PODS 2005. (security and privacy)
  • Simulatable auditing. Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim. PODS 2005. (security and privacy)
  • To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Top-Down Specialization for Information and Privacy Preservation. Benjamin C. M. Fung, Ke Wang, Philip S. Yu. ICDE 2005. (privacy-preserving data management)
  • Verifying Completeness of Relational Query Results in Data Publishing. HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan. ACM SIGMOD Conference 2005. (correctness and trust)


2004

  • A Formal Analysis of Information Disclosure in Data Exchange. Gerome Miklau, Dan Suciu. ACM SIGMOD Conference 2004. (security and privacy)
  • A Privacy-Preserving Index for Range Queries. Bijit Hore, Sharad Mehrotra, Gene Tsudik. VLDB 2004. (privacy)
  • Extending Query Rewriting Techniques for Fine-Grained Access Control. Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, Prasan Roy. ACM SIGMOD Conference 2004. (security and privacy)
  • Order-Preserving Encryption for Numeric Data. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu. ACM SIGMOD Conference 2004. (security and privacy)
  • Resilient Rights Protection for Sensor Streams. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. VLDB 2004. (privacy)
  • Secure XML Querying with Security Views. Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis. ACM SIGMOD Conference 2004. (security and privacy)
  • Vision Paper: Enabling Privacy for the Paranoids. Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani, Utkarsh Srivastava, Dilys Thomas, Jennifer Widom, Ying Xu. VLDB 2004. (privacy)


2003

  • Information Sharing Across Private Databases. Rakesh Agrawal, Alexandre V. Evfimievski, Ramakrishnan Srikant. ACM SIGMOD Conference 2003. (data security and protection)
  • Limiting privacy breaches in privacy preserving data mining. Alexandre V. Evfimievski, Johannes Gehrke, Ramakrishnan Srikant. PODS 2003. (security and privacy)
  • Query-preserving watermarking of relational databases and XML documents. David Gross-Amblard. PODS 2003. (security and privacy)
  • Revealing information while preserving privacy. Irit Dinur, Kobbi Nissim. PODS 2003. (security and privacy)
  • Rights Protection for Relational Data. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. ACM SIGMOD Conference 2003. (data security and protection)
  • Winnowing: Local Algorithms for Document Fingerprinting. Saul Schleimer, Daniel Shawcross Wilkerson, Alexander Aiken. ACM SIGMOD Conference 2003. (data security and protection)


1997

  • A Unified Framework for Enforcing Multiple Access Control Policies. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino. ACM SIGMOD Conference 1997. (security and commit)
  • Revisiting Commit Processing in Distributed Database Systems. Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritham. ACM SIGMOD Conference 1997. (security and commit)
  • Secure Transaction Processing in Firm Real-Time Database Systems. Binto George, Jayant R. Haritsa. ACM SIGMOD Conference 1997. (security and commit)


1992

  • Database Recovery Using Redundant Disk Arrays. Antoine N. Mourad, W. Kent Fuchs, Daniel G. Saab. ICDE 1992. (data integrity)
  • Semantically Consistent Schedules for Efficient and Concurrent B-Tree Restructuring. Ragaa Ishak. ICDE 1992. (data integrity)
  • Using Coding to Support Data Resiliency in Distributed Systems. Pankaj Jalote, Gagan Agrawal. ICDE 1992. (data integrity)


1990

  • Multilevel Secure Database Concurrency Control. Thomas F. Keefe, Wei-Tek Tsai, Jaideep Srivastava. ICDE 1990. (database security)
  • The Fingerprinted Database. Neal R. Wagner, Robert L. Fountain, Robert J. Hazy. ICDE 1990. (database security)
  • The Semantic Data Model for Security: Representing the Security Semantics of an Application. Gary W. Smith. ICDE 1990. (database security)


1989

  • An Access Authorization Model for Relational Databases Based on Algebraic Manipulation of View Definitions. Amihai Motro. ICDE 1989. (data security)
  • Password Authentication Based On Public-Key Distribution Cryptosystem. Lein Harn, David Huang, Chi-Sung Laih. ICDE 1989. (data security)
  • SDDM - A Prototype of a Distributed Architecture for Database Security. Catherine D. Jensen, Robert M. Kiel, Richard D. Verjinski. ICDE 1989. (data security)
  • The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). Joachim Biskup, Hans Hermann Brüggemann. ICDE 1989. (data security)


1987

  • Computer Architectures, Database Security, and An Evaluation Metric. Ronda R. Henning, Brian S. Hubbard, Swen A. Walker. ICDE 1987. (panel, database security issues)


1986

  • A Controllable Prolog Database System. Naftaly H. Minsky, David Rozenshtein, Jan Chomicki. ICDE 1986. (panel, security)
  • Assessment of Data Management Security Technology for Military Requirements. V. Lakshmi Rebbapragada. ICDE 1986. (panel, security)
  • Distributed Processing Systems Security: Communications, Computer, or Both. Paul Woodie. ICDE 1986. (panel, security)
  • On Denial-of-Service in Computer Networks. Virgil D. Gligor. ICDE 1986. (panel, security)


1981

  • A Database Approach to Modelling and Managing Security Information. U. Bussolati, Giancarlo Martella. VLDB 1981. (data dictionaries and security)
  • Data Dictionaries: An Assessment of Current Practice and Problems. Robert M. Curtice. VLDB 1981. (data dictionaries and security)
  • SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases. Paul Chan, Arie Shoshani. VLDB 1981. (data dictionaries and security)
  • Synergistic Authorization in Database Systems. Naftaly H. Minsky. VLDB 1981. (data dictionaries and security)


1979

  • Data Base Management Systems Security and INGRES. Deborah Downs, Gerald J. Popek. VLDB 1979. (data base security, consistency and conversion)
  • Database Program Conversion: A Framework for Research. Robert W. Taylor, James P. Fry, Ben Shneiderman, Diane C. P. Smith, Stanley Y. W. Su. VLDB 1979. (data base security, consistency and conversion)
  • Proving Consistency of Database Transactions. Georges Gardarin, Michel A. Melkanoff. VLDB 1979. (data base security, consistency and conversion)


1978

  • Privacy and Security of Data Communications and Data Bases. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick. VLDB 1978. (survey, data base security and privacy)
  • Security and Privacy. George I. Davida. VLDB 1978. (survey, data base security and privacy)


1977

  • A Kernel Design for a Secure Data Base Management System. Deborah Downs, Gerald J. Popek. VLDB 1977. (security, integrity, recovery)
  • A Study on the Protection of Statistical Data Bases. Clement T. Yu, Francis Y. L. Chin. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Auditing Large Scale Data Bases. George M. Scott. VLDB 1977. (security, integrity, recovery)
  • Interval Hierarchies and Their Application to Predicate Files (Abstract). Kai C. Wong, Murray Edelberg. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (Abstract). Guy M. Lohman, John A. Muckstadt. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Protection of Information in Relational Data Bases. François Bancilhon, Nicolas Spyratos. VLDB 1977. (security, integrity, recovery)
  • Recovery and Carsh Resistance in a Filing System. Joost Verhofstad. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Scheduling Algorithms for Avoiding Inconsistency in Large Databases. Georges Gardarin, P. Lebeux. VLDB 1977. (security, integrity, recovery)


1975

  • Granularity of Locks in a Large Shared Data Base. Jim Gray, Raymond A. Lorie, Gianfranco R. Putzolu, Irving L. Traiger. VLDB 1975. (security and integrity)
  • On the Encipherment of Search Trees and Random Access Files. Rudolf Bayer, J. K. Metzger. VLDB 1975. (security and integrity)

Also on Fandom

Random wikia