Author:
Bonifati Angela,Liu Ruilin,Wang Hui
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Gribble, S.D., Halevy, A.Y., Ives, Z.G., Rodrigand, M., Suciu, D.: What Can Database Do for Peer-to-Peer?. In: Proc. of WebDB (2001)
2. Hose, K., Roth, A., Zeitz, A., Sattler, K.U., Naumann, F.: A research agenda for query processing in large-scale peer data management systems. Inf. Syst. 33(7–8), 597–610 (2008)
3. Bonifati, A., Chrysanthis, P.K., Ouksel, A.M., Sattler, K.U.: Distributed databases and peer-to-peer databases: past and present. SIGMOD Rec. 37(1), 5–11 (2008)
4. Sandhu, R., Zhang, X.: Peer to peer access control architecture using trusted computing technology. In: Proc. of ACMT (2005)
5. Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: Oceanstore: an architecture for global-scale persistent storage. SIGPLAN Not. 35(11), 190–201 (2000)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy Aware Access Control;Censorship, Surveillance, and Privacy;2019
2. Privacy Aware Access Control;International Journal of Information Technologies and Systems Approach;2017-07
3. Query Reformulation in PDMS Based on Social Relevance;Transactions on Large-Scale Data- and Knowledge-Centered Systems XIII;2014