Secure Data Management最新文献

筛选
英文 中文
Architecture for Data Collection in Database Intrusion Detection Systems 数据库入侵检测系统中数据采集的体系结构
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_7
Xin Jin, Sylvia L. Osborn
{"title":"Architecture for Data Collection in Database Intrusion Detection Systems","authors":"Xin Jin, Sylvia L. Osborn","doi":"10.1007/978-3-540-75248-6_7","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_7","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An Intrusion Detection System for Detecting Phishing Attacks 一种检测网络钓鱼攻击的入侵检测系统
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_13
Hasika Pamunuwa, D. Wijesekera, C. Farkas
{"title":"An Intrusion Detection System for Detecting Phishing Attacks","authors":"Hasika Pamunuwa, D. Wijesekera, C. Farkas","doi":"10.1007/978-3-540-75248-6_13","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_13","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Query Rewriting Algorithm Evaluation for XML Security Views XML安全视图的查询重写算法评估
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_5
Nataliya Rassadko
{"title":"Query Rewriting Algorithm Evaluation for XML Security Views","authors":"Nataliya Rassadko","doi":"10.1007/978-3-540-75248-6_5","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_5","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data 加密数据联合关键字检索的通用安全索引
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_8
Peishun Wang, Huaxiong Wang, J. Pieprzyk
{"title":"Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data","authors":"Peishun Wang, Huaxiong Wang, J. Pieprzyk","doi":"10.1007/978-3-540-75248-6_8","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_8","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127405074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases 数字数据库中基于不精确和不确定性权衡的查询回答
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_6
A. Brodsky, Lei Zhang, S. Jajodia
{"title":"Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases","authors":"A. Brodsky, Lei Zhang, S. Jajodia","doi":"10.1007/978-3-540-75248-6_6","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_6","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127869475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Unified Conflict Resolution Algorithm 统一的冲突解决算法
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_1
Amir H. Chinaei, H. Chinaei, Frank Wm. Tompa
{"title":"A Unified Conflict Resolution Algorithm","authors":"Amir H. Chinaei, H. Chinaei, Frank Wm. Tompa","doi":"10.1007/978-3-540-75248-6_1","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_1","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement 使用策略优化改进医疗保健中的隐私策略覆盖范围
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_11
Rafae Bhatti, Tyrone Grandison
{"title":"Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement","authors":"Rafae Bhatti, Tyrone Grandison","doi":"10.1007/978-3-540-75248-6_11","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_11","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Requirements of Secure Storage Systems for Healthcare Records 医疗记录安全存储系统要求
Secure Data Management Pub Date : 2007-09-23 DOI: 10.1007/978-3-540-75248-6_12
Ragib Hasan, M. Winslett, R. Sion
{"title":"Requirements of Secure Storage Systems for Healthcare Records","authors":"Ragib Hasan, M. Winslett, R. Sion","doi":"10.1007/978-3-540-75248-6_12","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_12","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Difference Set Attacks on Conjunctive Keyword Search Schemes 合取关键字搜索方案的差集攻击
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_5
H. Rhee, I. Jeong, J. Byun, Dong Hoon Lee
{"title":"Difference Set Attacks on Conjunctive Keyword Search Schemes","authors":"H. Rhee, I. Jeong, J. Byun, Dong Hoon Lee","doi":"10.1007/11844662_5","DOIUrl":"https://doi.org/10.1007/11844662_5","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases 垂直分区数据库聚类的保密性BIRCH算法
Secure Data Management Pub Date : 2006-09-10 DOI: 10.1007/11844662_7
P. Prasad, C. Rangan
{"title":"Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases","authors":"P. Prasad, C. Rangan","doi":"10.1007/11844662_7","DOIUrl":"https://doi.org/10.1007/11844662_7","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信