{"title":"Secure Data Management in Decentralized Systems","authors":"Ting Yu, S. Jajodia","doi":"10.1007/978-0-387-27696-0","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Trust Negotiation in Open Systems","authors":"Adam J. Lee, K. Seamons, M. Winslett, Ting Yu","doi":"10.1007/978-0-387-27696-0_7","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_7","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy in On-line Analytical Processing Data Cubes","authors":"Lingyu Wang, S. Jajodia, D. Wijesekera","doi":"10.1007/978-0-387-27696-0_11","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_11","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rights Assessment for Relational Data","authors":"R. Sion","doi":"10.1007/978-0-387-27696-0_13","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_13","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Anonymity","authors":"V. Ciriani, S. Vimercati, S. Foresti, P. Samarati","doi":"10.1007/978-0-387-27696-0_10","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_10","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wendy Hui Wang, D. Srivastava, L. Lakshmanan, SungRan Cho, S. Amer-Yahia
{"title":"Optimizing Tree Pattern Queries over Secure XML Databases","authors":"Wendy Hui Wang, D. Srivastava, L. Lakshmanan, SungRan Cho, S. Amer-Yahia","doi":"10.1007/978-0-387-27696-0_5","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_5","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127345792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Search on Encrypted Data","authors":"Hakan Hacıgümüş, B. Hore, B. Iyer, S. Mehrotra","doi":"10.1007/978-0-387-27696-0_12","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_12","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131723051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Antoniou, M. Baldoni, P. Bonatti, W. Nejdl, D. Olmedilla
{"title":"Rule-based Policy Specification","authors":"G. Antoniou, M. Baldoni, P. Bonatti, W. Nejdl, D. Olmedilla","doi":"10.1007/978-0-387-27696-0_6","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_6","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Trust and Security in Peer-to-Peer Systems","authors":"Terry Bearly, Vijay Kumar","doi":"10.1007/978-0-387-27696-0_8","DOIUrl":"https://doi.org/10.1007/978-0-387-27696-0_8","url":null,"abstract":"","PeriodicalId":370210,"journal":{"name":"Secure Data Management in Decentralized Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}