Fandom

Scratchpad

Security, privacy, and authorization bibliography

219,207pages on
this wiki
Add New Page
Discuss this page0 Share


2006

  • Composition and Disclosure of Unlinkable Distributed Databases. Bradley Malin, Latanya Sweeney. ICDE 2006. (poster, data privacy and security)
  • Mondrian Multidimensional K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ICDE 2006. (data privacy and security)
  • Privacy Preserving Query Processing Using Third Parties. Fatih Emekçi, Divyakant Agrawal, Amr El Abbadi, Aziz Gulbeden. ICDE 2006. (data privacy and security)
  • Private Updates to Anonymous Databases. Alberto Trombetta, Elisa Bertino. ICDE 2006. (poster, data privacy and security)
  • Provable Security for Outsourcing Database Operations. Sergei Evdokimov, Matthias Fischmann, Oliver Günther. ICDE 2006. (poster, data privacy and security)
  • Sovereign Joins. Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, Yaping Li. ICDE 2006. (data privacy and security)
  • Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor. ICDE 2006. (poster, data privacy and security)
  • l-Diversity: Privacy Beyond k-Anonymity. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam. ICDE 2006. (data privacy and security)


2005

  • A Framework for High-Accuracy Privacy-Preserving Mining. Shipra Agrawal, Jayant R. Haritsa. ICDE 2005. (privacy-preserving data management)
  • Assuring Security Properties in Third-party Architectures. Barbara Carminati, Elena Ferrari, Elisa Bertino. ICDE 2005. (privacy and security)
  • Automatic Composition of Transition-based Semantic Web Services with Messaging. Daniela Berardi, Diego Calvanese, Giuseppe De Giacomo, Richard Hull, Massimo Mecella. VLDB 2005. (correctness and performance)
  • Checking for k-Anonymity Violation by Views. Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia. VLDB 2005. (privacy)
  • Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, Yiheng Li. ICDE 2005. (privacy and security)
  • Data Privacy through Optimal k-Anonymization. Roberto J. Bayardo Jr., Rakesh Agrawal. ICDE 2005. (privacy-preserving data management)
  • Deriving Private Information from Randomized Data. Zhengli Huang, Wenliang Du, Biao Chen. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Distributed Privacy Preserving Information Sharing. Nan Zhang, Wei Zhao. VLDB 2005. (privacy)
  • Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. Qingbo Zhu, Windsor W. Hsu. ACM SIGMOD Conference 2005. (correctness and trust)
  • Improving Performance of Cluster-based Secure Application Servers with User-level Communication. Jin-Ha Kim, Gyu Sang Choi, Chita R. Das. ICDE 2005. (privacy and security)
  • Incognito: Efficient Full-Domain K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Middleware based Data Replication providing Snapshot Isolation. Yi Lin, Bettina Kemme, Marta Patiño-Martínez, Ricardo Jiménez-Peris. ACM SIGMOD Conference 2005. (correctness and trust)
  • On k-Anonymity and the Curse of Dimensionality. Charu C. Aggarwal. VLDB 2005. (privacy)
  • Parallel Execution of Test Runs for Database Application Systems. Florian Haftmann, Donald Kossmann, Eric Lo. VLDB 2005. (correctness and performance)
  • Practical privacy: the SuLQ framework. Avrim Blum, Cynthia Dwork, Frank McSherry, Kobbi Nissim. PODS 2005. (security and privacy)
  • Privacy and Ownership Preserving of Outsourced Medical Data. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng. ICDE 2005. (privacy and security)
  • Privacy-Preserving Top-K Queries. Jaideep Vaidya, Chris Clifton. ICDE 2005. (privacy and security)
  • Privacy-enhancing k-anonymization of customer data. Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright. PODS 2005. (security and privacy)
  • Query Execution Assurance for Outsourced Databases. Radu Sion. VLDB 2005. (correctness and performance)
  • Security analysis of cryptographically controlled access to XML documents. Martín Abadi, Bogdan Warinschi. PODS 2005. (security and privacy)
  • Simulatable auditing. Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim. PODS 2005. (security and privacy)
  • To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
  • Top-Down Specialization for Information and Privacy Preservation. Benjamin C. M. Fung, Ke Wang, Philip S. Yu. ICDE 2005. (privacy-preserving data management)
  • Verifying Completeness of Relational Query Results in Data Publishing. HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan. ACM SIGMOD Conference 2005. (correctness and trust)


2004

  • A Formal Analysis of Information Disclosure in Data Exchange. Gerome Miklau, Dan Suciu. ACM SIGMOD Conference 2004. (security and privacy)
  • A Privacy-Preserving Index for Range Queries. Bijit Hore, Sharad Mehrotra, Gene Tsudik. VLDB 2004. (privacy)
  • Extending Query Rewriting Techniques for Fine-Grained Access Control. Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, Prasan Roy. ACM SIGMOD Conference 2004. (security and privacy)
  • Order-Preserving Encryption for Numeric Data. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu. ACM SIGMOD Conference 2004. (security and privacy)
  • Resilient Rights Protection for Sensor Streams. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. VLDB 2004. (privacy)
  • Secure XML Querying with Security Views. Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis. ACM SIGMOD Conference 2004. (security and privacy)
  • Vision Paper: Enabling Privacy for the Paranoids. Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani, Utkarsh Srivastava, Dilys Thomas, Jennifer Widom, Ying Xu. VLDB 2004. (privacy)


2003

  • Information Sharing Across Private Databases. Rakesh Agrawal, Alexandre V. Evfimievski, Ramakrishnan Srikant. ACM SIGMOD Conference 2003. (data security and protection)
  • Limiting privacy breaches in privacy preserving data mining. Alexandre V. Evfimievski, Johannes Gehrke, Ramakrishnan Srikant. PODS 2003. (security and privacy)
  • Query-preserving watermarking of relational databases and XML documents. David Gross-Amblard. PODS 2003. (security and privacy)
  • Revealing information while preserving privacy. Irit Dinur, Kobbi Nissim. PODS 2003. (security and privacy)
  • Rights Protection for Relational Data. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. ACM SIGMOD Conference 2003. (data security and protection)
  • Winnowing: Local Algorithms for Document Fingerprinting. Saul Schleimer, Daniel Shawcross Wilkerson, Alexander Aiken. ACM SIGMOD Conference 2003. (data security and protection)


1997

  • A Unified Framework for Enforcing Multiple Access Control Policies. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino. ACM SIGMOD Conference 1997. (security and commit)
  • Revisiting Commit Processing in Distributed Database Systems. Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritham. ACM SIGMOD Conference 1997. (security and commit)
  • Secure Transaction Processing in Firm Real-Time Database Systems. Binto George, Jayant R. Haritsa. ACM SIGMOD Conference 1997. (security and commit)


1992

  • Database Recovery Using Redundant Disk Arrays. Antoine N. Mourad, W. Kent Fuchs, Daniel G. Saab. ICDE 1992. (data integrity)
  • Semantically Consistent Schedules for Efficient and Concurrent B-Tree Restructuring. Ragaa Ishak. ICDE 1992. (data integrity)
  • Using Coding to Support Data Resiliency in Distributed Systems. Pankaj Jalote, Gagan Agrawal. ICDE 1992. (data integrity)


1990

  • Multilevel Secure Database Concurrency Control. Thomas F. Keefe, Wei-Tek Tsai, Jaideep Srivastava. ICDE 1990. (database security)
  • The Fingerprinted Database. Neal R. Wagner, Robert L. Fountain, Robert J. Hazy. ICDE 1990. (database security)
  • The Semantic Data Model for Security: Representing the Security Semantics of an Application. Gary W. Smith. ICDE 1990. (database security)


1989

  • An Access Authorization Model for Relational Databases Based on Algebraic Manipulation of View Definitions. Amihai Motro. ICDE 1989. (data security)
  • Password Authentication Based On Public-Key Distribution Cryptosystem. Lein Harn, David Huang, Chi-Sung Laih. ICDE 1989. (data security)
  • SDDM - A Prototype of a Distributed Architecture for Database Security. Catherine D. Jensen, Robert M. Kiel, Richard D. Verjinski. ICDE 1989. (data security)
  • The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). Joachim Biskup, Hans Hermann Brüggemann. ICDE 1989. (data security)


1987

  • Computer Architectures, Database Security, and An Evaluation Metric. Ronda R. Henning, Brian S. Hubbard, Swen A. Walker. ICDE 1987. (panel, database security issues)


1986

  • A Controllable Prolog Database System. Naftaly H. Minsky, David Rozenshtein, Jan Chomicki. ICDE 1986. (panel, security)
  • Assessment of Data Management Security Technology for Military Requirements. V. Lakshmi Rebbapragada. ICDE 1986. (panel, security)
  • Distributed Processing Systems Security: Communications, Computer, or Both. Paul Woodie. ICDE 1986. (panel, security)
  • On Denial-of-Service in Computer Networks. Virgil D. Gligor. ICDE 1986. (panel, security)


1981

  • A Database Approach to Modelling and Managing Security Information. U. Bussolati, Giancarlo Martella. VLDB 1981. (data dictionaries and security)
  • Data Dictionaries: An Assessment of Current Practice and Problems. Robert M. Curtice. VLDB 1981. (data dictionaries and security)
  • SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases. Paul Chan, Arie Shoshani. VLDB 1981. (data dictionaries and security)
  • Synergistic Authorization in Database Systems. Naftaly H. Minsky. VLDB 1981. (data dictionaries and security)


1979

  • Data Base Management Systems Security and INGRES. Deborah Downs, Gerald J. Popek. VLDB 1979. (data base security, consistency and conversion)
  • Database Program Conversion: A Framework for Research. Robert W. Taylor, James P. Fry, Ben Shneiderman, Diane C. P. Smith, Stanley Y. W. Su. VLDB 1979. (data base security, consistency and conversion)
  • Proving Consistency of Database Transactions. Georges Gardarin, Michel A. Melkanoff. VLDB 1979. (data base security, consistency and conversion)


1978

  • Privacy and Security of Data Communications and Data Bases. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick. VLDB 1978. (survey, data base security and privacy)
  • Security and Privacy. George I. Davida. VLDB 1978. (survey, data base security and privacy)


1977

  • A Kernel Design for a Secure Data Base Management System. Deborah Downs, Gerald J. Popek. VLDB 1977. (security, integrity, recovery)
  • A Study on the Protection of Statistical Data Bases. Clement T. Yu, Francis Y. L. Chin. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Auditing Large Scale Data Bases. George M. Scott. VLDB 1977. (security, integrity, recovery)
  • Interval Hierarchies and Their Application to Predicate Files (Abstract). Kai C. Wong, Murray Edelberg. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (Abstract). Guy M. Lohman, John A. Muckstadt. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Protection of Information in Relational Data Bases. François Bancilhon, Nicolas Spyratos. VLDB 1977. (security, integrity, recovery)
  • Recovery and Carsh Resistance in a Filing System. Joost Verhofstad. ACM SIGMOD Conference 1977. (data base integrity and protection)
  • Scheduling Algorithms for Avoiding Inconsistency in Large Databases. Georges Gardarin, P. Lebeux. VLDB 1977. (security, integrity, recovery)


1975

  • Granularity of Locks in a Large Shared Data Base. Jim Gray, Raymond A. Lorie, Gianfranco R. Putzolu, Irving L. Traiger. VLDB 1975. (security and integrity)
  • On the Encipherment of Search Trees and Random Access Files. Rudolf Bayer, J. K. Metzger. VLDB 1975. (security and integrity)

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Also on Fandom

Random wikia