Abstract is missing.
- Query Optimization in Encrypted Relational Databases by Vertical Schema PartitioningMustafa Canim, Murat Kantarcioglu, Ali Inan. 1-16 [doi]
- Do You Know Where Your Data s Been? - Tamper-Evident Database ProvenanceJing Zhang, Adriane Chapman, Kristen LeFevre. 17-32 [doi]
- Database Intrusion Detection Using Role Profiling with Role HierarchyGarfield Zhiping Wu, Sylvia L. Osborn, Xin Jin. 33-48 [doi]
- Query Processing Techniques for Compliance with Data Confidence PoliciesChenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani M. Thuraisingham. 49-67 [doi]
- An Access Control Language for a General Provenance ModelQun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han. 68-88 [doi]
- A Flexible Access Control Model for Distributed Collaborative EditorsAbdessamad Imine, Asma Cherif, Michaël Rusinowitch. 89-106 [doi]
- On the Construction and Verification of Self-modifying Access Control PoliciesDavid J. Power, Mark Slaymaker, Andrew C. Simpson. 107-121 [doi]
- Controlling Access to XML Documents over XML Native and Relational DatabasesLazaros Koromilas, George Chinis, Irini Fundulaki, Sotiris Ioannidis. 122-141 [doi]
- Longitude: Centralized Privacy-Preserving Computation of Users ProximitySergio Mascetti, Claudio Bettini, Dario Freni. 142-157 [doi]
- L-Cover: Preserving Diversity by AnonymityLei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexander Brodsky. 158-171 [doi]