| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Privacy Protection
Indistinguishability: The Other Aspect of Privacy
Sovereign Information Sharing Among Malicious Partners
Temporal Context Lie Detection and Generation
Secure Anonymization for Incremental Datasets
Privacy Preserving Data Management
Difference Set Attacks on Conjunctive Keyword Search Schemes
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases
Access Control
Conflict of Interest in the Administrative Role Graph Model
Two Phase Filtering for XML Access Control
Hybrid Authorizations and Conflict Resolution
Database Security
Analysis of a Database and Index Encryption Scheme Problems and Fixes
Information Disclosure by XPath Queries
SPIDER: An Autonomic Computing Approach to Database Security Management
Author Index