Data Leakage Detection
Abstract
Keywords
Full Text:
PDFReferences
R. Agrawal and J. Kiernan, ―Watermarking Relational Databases,‖Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.
P. Bonatti, S.D.C.di Vimercati, and P. Samarati, ―An Algebra for Composing Access Control Policies,‖ ACM Trans. Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.
P. Buneman, S.Khanna, and W.C.Tan,―Why and Where: A Characterization of Data Provenance,‖ Proc. Eighth Int’l Conf. Database Theory (ICDT ’01), J.V. den Bussche and V. Vianu, eds.,pp. 316-330, Jan. 2001.
P. Buneman and W.C.Tan, ―Provenance in Databases,‖ Proc. ACM SIGMOD, pp. 1171-1173, 2007.
Y. Cui and J. Widom, ―Lineage Tracing for General Data Warehouse Transformations,‖ The VLDB J., vol. 12, pp. 41-58, 2003.
S. Czerwinski,R. Fromm, and T.Hodes, ―Digital Music Distribution and Audio Watermarking,‖ http://www.scientificcommons.org/43025658, 2007.
F. Guo, J.Wang, Z.Zhang, X.Ye, and D. Li, ―An Improved Algorithm to Watermark Numeric Relational Data,‖ Information Security Applications, pp.138-149, Springer, 2006.
F. Hartung and B.Girod, ―Watermarking of Uncompressed and Compressed Video,‖ Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
S.Jajodia, P.Samarati, M.L.Sapino, and V.S. Subrahmanian, ―Flexible Support for Multiple Access Control Policies,‖ ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.
Y.Li, V.Swarup, and S.Jajodia, ―Finger – printing Relational Databases: Schemes and Specialties,‖ IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
B. Mungamuru and H. Garcia-Molina, ―Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,‖ technical report, Stanford Univ., 2008.
V.N.Murty,―Counting the Integer Solutions of a Linear Equation with Unit Coefficients,‖ Math. Magazine, vol. 54, no. 2, pp. 79-81, 1981.
S.U.Nabar, B.Marthi, K.Kenthapadi, N. Mishra, and R.Motwani,―Towards Robustness in Query Auditing,‖ Proc. 32nd Int’l Conf. Very Large Data Bases (VLDB ’06), VLDB Endowment, pp. 151-162, 2006.
P.M. Pardalos and S.A. Vavasis, ―Quadratic Programming with One Negative Eigenvalue Is NP-Hard,‖ J. Global Optimization,vol. 1, no. 1, pp. 15-22, 1991.
P.Papadimitriou and H.Garcia-Molina, ―Data Leakage Detection,‖ technical report, Stanford Univ., 2008.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.