Using safety constraint for transactional dataset anonymization, DBSec 2013, pp.164-178, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01490703
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3 ,
DOI : 10.1145/1805974.1805978
Slicing: A New Approach for Privacy Preserving Data Publishing, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.3, pp.561-574, 2012. ,
DOI : 10.1109/TKDE.2010.236
Query processing in private data outsourcing using anonymization, LNCS, vol.6818, pp.138-153, 2011. ,
Updating outsourced anatomized private databases, Proceedings of the 16th International Conference on Extending Database Technology, EDBT '13, pp.179-190, 2013. ,
DOI : 10.1145/2452376.2452399
Anatomy: Simple and effective privacy preservation, Proceedings of 32nd International Conference on Very Large Data Bases, 2006. ,
Nora Cuppens-Boulahia, and David Gross-Amblard Optimizing Integrity Checks for Join Queries in the Cloud, p.33 ,
Stefano Paraboschi, and Pierangela Samarati Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials, p.49 ,
Slamanig Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds, p.66 ,
Frédéric Cuppens, and Indrajit Ray Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud, p.82 ,
Location Proof Assertion for Mobile Devices, p.146 ,
Md Munirul Haque, and Ragib Hasan XVI Table of Contents Design Patterns for Multiple Stakeholders in Social Computing, p.163 ,
Fong Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure, p.179 ,
Haibing Lu, and Lingyu Wang ELITE: zEro Links Identity managemenT systEm ,
Frédéric Cuppens, Indrajit Ray, and Indrakshi Ray Dynamic Workflow Adjustment with Security Constraints, p.211 ,
Yi Fang, and Lian Duan Consistent Query Plan Generation in Secure Cooperative Data Access, p.227 ,
and Sushil Jajodia Hunting the Unknown: White-Box Database Leakage Detection, p.243 ,
Sandro Etalle, and Mykola Pechenizkiy Incremental Analysis of Evolving Administrative Role Based Access Control Policies, 260 Silvio Ranise and Anh Truong Mining Attribute-Based Access Control Policies from Logs . . . . . . . . . . . . 276 ,
307 Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, and Ramarathnam Venkatesan Towards Secure Cloud Database with Fine-Grained Access Control, p.324 ,
Vaidy Sunderam, and Li Xiong Practical Private Information Retrieval from a Time-Varying ,