Abstract is missing.
- Secure and Privacy Preserving Outsourcing of Tree Structured DataPing Lin, K. Selçuk Candan. 1-17 [doi]
- Using Secret Sharing for Searching in Encrypted DataRichard Brinkman, Jeroen Doumen, Willem Jonker. 18-27 [doi]
- A Structure Preserving Database Encryption SchemeYuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes. 28-40 [doi]
- Modeling Integrity in Data ExchangeGerome Miklau, Dan Suciu. 41-54 [doi]
- Experimental Analysis of Privacy-Preserving Statistics ComputationHiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang. 55-66 [doi]
- Achieving Privacy Preservation when Sharing Data for ClusteringStanley R. M. Oliveira, Osmar R. Zaïane. 67-82 [doi]
- Privacy-Preserving Digital Rights ManagementClaudine Conrado, Milan Petkovic, Willem Jonker. 83-99 [doi]
- Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical ConcernsDawn N. Jutla, Peter Bodorik, Deyun Gao. 100-117 [doi]
- PeerTrust: Automated Trust Negotiation for Peers on the Semantic WebWolfgang Nejdl, Daniel Olmedilla, Marianne Winslett. 118-132 [doi]
- A Flexible Framework for Architecting XML Access Control Enforcement MechanismsBo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu. 133-147 [doi]
- Abstracting and Refining Authorization in SQLArnon Rosenthal, Edward Sciore. 148-162 [doi]
- A Classifier-Based Approach to User-Role Assignment for Web ApplicationsShengli Sheng, Sylvia L. Osborn. 163-171 [doi]
- LTAM: A Location-Temporal Authorization ModelHai Yu, Ee-Peng Lim. 172-186 [doi]
- Identifying Sensitive Associations in Databases for Release ControlClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia. 187-201 [doi]
- Using Delay to Defend Against Database ExtractionMagesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish. 202-218 [doi]