ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Lecture Notes in Computer Science - Secure Data Management
Latest Publications
TOTAL DOCUMENTS
15
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783540852582, 9783540852599
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A Methodology for Bridging between RBAC and an Arbitrary Application Program
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_13
◽
2008
◽
pp. 199-208
◽
Cited By ~ 1
Author(s):
Candy Wai-Yue Shum
◽
Sylvia L. Osborn
◽
He Wang
Keyword(s):
Application Program
Download Full-text
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_11
◽
2008
◽
pp. 169-184
◽
Cited By ~ 9
Author(s):
Mark Slaymaker
◽
David Power
◽
Douglas Russell
◽
Andrew Simpson
Keyword(s):
Fine Grained
◽
Healthcare Data
Download Full-text
Auditing Inference Based Disclosures in Dynamic Databases
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_5
◽
2008
◽
pp. 67-81
Author(s):
Vikram Goyal
◽
S. K. Gupta
◽
Manish Singh
◽
Anand Gupta
Keyword(s):
Dynamic Databases
Download Full-text
Query Rewriting for Access Control on Semantic Web
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_10
◽
2008
◽
pp. 151-168
◽
Cited By ~ 5
Author(s):
Jian Li
◽
William K. Cheung
Keyword(s):
Access Control
◽
Semantic Web
◽
Query Rewriting
Download Full-text
Simulatable Binding: Beyond Simulatable Auditing
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_2
◽
2008
◽
pp. 16-31
◽
Cited By ~ 1
Author(s):
Lei Zhang
◽
Sushil Jajodia
◽
Alexander Brodsky
Download Full-text
How Anonymous Is k-Anonymous? Look at Your Quasi-ID
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_1
◽
2008
◽
pp. 1-15
◽
Cited By ~ 1
Author(s):
Claudio Bettini
◽
X. Sean Wang
◽
Sushil Jajodia
Download Full-text
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_3
◽
2008
◽
pp. 32-49
◽
Cited By ~ 4
Author(s):
Mohamed R. Fouad
◽
Guy Lebanon
◽
Elisa Bertino
Download Full-text
An Anonymity Model Achievable Via Microaggregation
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_14
◽
2008
◽
pp. 209-218
◽
Cited By ~ 7
Author(s):
Josep Domingo-Ferrer
◽
Francesc Sebé
◽
Agusti Solanas
Download Full-text
Responding to Anomalous Database Requests
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_4
◽
2008
◽
pp. 50-66
◽
Cited By ~ 4
Author(s):
Ashish Kamra
◽
Elisa Bertino
◽
Rimma Nehme
Download Full-text
Engineering Privacy Requirements in Business Intelligence Applications
Lecture Notes in Computer Science - Secure Data Management
◽
10.1007/978-3-540-85259-9_15
◽
2008
◽
pp. 219-228
◽
Cited By ~ 5
Author(s):
Annamaria Chiasera
◽
Fabio Casati
◽
Florian Daniel
◽
Yannis Velegrakis
Keyword(s):
Business Intelligence
◽
Privacy Requirements
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close