Secure Data Management最新文献

筛选
英文 中文
Indistinguishability: The Other Aspect of Privacy 不可区分性:隐私的另一面
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_1
Chao Yao, Lingyu Wang, X. Wang, S. Jajodia
{"title":"Indistinguishability: The Other Aspect of Privacy","authors":"Chao Yao, Lingyu Wang, X. Wang, S. Jajodia","doi":"10.1007/11844662_1","DOIUrl":"https://doi.org/10.1007/11844662_1","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115445472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Temporal Context Lie Detection and Generation 时间背景测谎与生成
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_3
X. An, D. Jutla, N. Cercone
{"title":"Temporal Context Lie Detection and Generation","authors":"X. An, D. Jutla, N. Cercone","doi":"10.1007/11844662_3","DOIUrl":"https://doi.org/10.1007/11844662_3","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conflict of Interest in the Administrative Role Graph Model 管理角色图模型中的利益冲突
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_8
Yunyu Song, Sylvia L. Osborn
{"title":"Conflict of Interest in the Administrative Role Graph Model","authors":"Yunyu Song, Sylvia L. Osborn","doi":"10.1007/11844662_8","DOIUrl":"https://doi.org/10.1007/11844662_8","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a Database and Index Encryption Scheme - Problems and Fixes 数据库和索引加密方案的分析-问题和修复
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_11
Ulrich Kühn
{"title":"Analysis of a Database and Index Encryption Scheme - Problems and Fixes","authors":"Ulrich Kühn","doi":"10.1007/11844662_11","DOIUrl":"https://doi.org/10.1007/11844662_11","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123381547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data 近期加密数据关键字搜索方案的离线猜测攻击
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_6
J. Byun, H. Rhee, Hyun-A. Park, Dong Hoon Lee
{"title":"Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data","authors":"J. Byun, H. Rhee, Hyun-A. Park, Dong Hoon Lee","doi":"10.1007/11844662_6","DOIUrl":"https://doi.org/10.1007/11844662_6","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 330
Secure Anonymization for Incremental Datasets 增量数据集的安全匿名化
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_4
Ji-Won Byun, Yonglak Sohn, E. Bertino, Ninghui Li
{"title":"Secure Anonymization for Incremental Datasets","authors":"Ji-Won Byun, Yonglak Sohn, E. Bertino, Ninghui Li","doi":"10.1007/11844662_4","DOIUrl":"https://doi.org/10.1007/11844662_4","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 203
Two Phase Filtering for XML Access Control XML访问控制的两阶段过滤
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_9
Changwoo Byun, Seog Park
{"title":"Two Phase Filtering for XML Access Control","authors":"Changwoo Byun, Seog Park","doi":"10.1007/11844662_9","DOIUrl":"https://doi.org/10.1007/11844662_9","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sovereign Information Sharing Among Malicious Partners 恶意伙伴之间的主权信息共享
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_2
S. Böttcher, S. Obermeier
{"title":"Sovereign Information Sharing Among Malicious Partners","authors":"S. Böttcher, S. Obermeier","doi":"10.1007/11844662_2","DOIUrl":"https://doi.org/10.1007/11844662_2","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid Authorizations and Conflict Resolution 混合授权和冲突解决
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_10
Amir H. Chinaei, Huaxin Zhang
{"title":"Hybrid Authorizations and Conflict Resolution","authors":"Amir H. Chinaei, Huaxin Zhang","doi":"10.1007/11844662_10","DOIUrl":"https://doi.org/10.1007/11844662_10","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Disclosure by XPath Queries 通过XPath查询进行信息披露
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_12
S. Böttcher, Rita Hartel
{"title":"Information Disclosure by XPath Queries","authors":"S. Böttcher, Rita Hartel","doi":"10.1007/11844662_12","DOIUrl":"https://doi.org/10.1007/11844662_12","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124191343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信