{"title":"Architecture for Data Collection in Database Intrusion Detection Systems","authors":"Xin Jin, Sylvia L. Osborn","doi":"10.1007/978-3-540-75248-6_7","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_7","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Detection System for Detecting Phishing Attacks","authors":"Hasika Pamunuwa, D. Wijesekera, C. Farkas","doi":"10.1007/978-3-540-75248-6_13","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_13","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query Rewriting Algorithm Evaluation for XML Security Views","authors":"Nataliya Rassadko","doi":"10.1007/978-3-540-75248-6_5","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_5","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data","authors":"Peishun Wang, Huaxiong Wang, J. Pieprzyk","doi":"10.1007/978-3-540-75248-6_8","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_8","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127405074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases","authors":"A. Brodsky, Lei Zhang, S. Jajodia","doi":"10.1007/978-3-540-75248-6_6","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_6","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127869475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Unified Conflict Resolution Algorithm","authors":"Amir H. Chinaei, H. Chinaei, Frank Wm. Tompa","doi":"10.1007/978-3-540-75248-6_1","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_1","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements of Secure Storage Systems for Healthcare Records","authors":"Ragib Hasan, M. Winslett, R. Sion","doi":"10.1007/978-3-540-75248-6_12","DOIUrl":"https://doi.org/10.1007/978-3-540-75248-6_12","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Difference Set Attacks on Conjunctive Keyword Search Schemes","authors":"H. Rhee, I. Jeong, J. Byun, Dong Hoon Lee","doi":"10.1007/11844662_5","DOIUrl":"https://doi.org/10.1007/11844662_5","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases","authors":"P. Prasad, C. Rangan","doi":"10.1007/11844662_7","DOIUrl":"https://doi.org/10.1007/11844662_7","url":null,"abstract":"","PeriodicalId":178017,"journal":{"name":"Secure Data Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}