Author:
Farnan Nicholas L.,Lee Adam J.,Chrysanthis Panos K.,Yu Ting
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Bell, D.E., Lapadula, L.J.: Secure computer system: unified exposition and multics interpretation (March 1976)
2. Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40, 666–682 (2001)
3. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS (1995)
4. Dierks, T., Rescorla, E.: Rfc 5246: The transport layer security (tls) protocol version 1.2 (August 2008)
5. Lecture Notes in Computer Science;C. Dwork,2006
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure and Policy-Compliant Query Processing on Heterogeneous Computational Storage Architectures;Proceedings of the 2022 International Conference on Management of Data;2022-06-10
2. Compliant Geo-distributed Query Processing;Proceedings of the 2021 International Conference on Management of Data;2021-06-09
3. Oblivious coopetitive analytics using hardware enclaves;Proceedings of the Fifteenth European Conference on Computer Systems;2020-04-15
4. Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication;Future Internet;2019-06-20
5. Authorization-aware optimization for multi-provider queries;Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing;2019-04-08