School of Computing
Department of Computer Science
CS5322: Database Security
[Announcements] [Instructor] [Course Objectives] [Lecture Schedule] [Reference Texts and Materials] [Assignment] [Project] [Assessment]
a) Patricia P.
Griffiths and Bradford W. Wade. An
Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1, 3 (Sep.
1976), Pages 242 - 255.
b) R.Fagin. On an Authorization Mechanism. ACM Trans. Database Syst.
3, 3 (Sep. 1978), Pages 310-319.
·
E.
Goh. Secure
Indexes. In the Cryptology ePrint Archive,
Report 2003/216, March16, 2004. http://eprint.iacr.org/2003/216/
·
Q. Zhu, W. W. Hsu: Fossilized
Index: The Linchpin of Trustworthy Non-Alterable Electronic Records.
SIGMOD’2006, 395-406, 2006.
·
S. Mitra,
W. W. Hsu, M. Winslett: Trustworthy
Keyword Search for Regulatory-Compliant Record Retention.VLDB’2006,
1001-1012, 2006
·
S.Mitra, M. Winslett: Secure Deletion
from Inverted Indexes on Compliance Storage. Proceedings of the 2006 ACM
Workshop On Storage Security And Survivability, StorageSS
2006, Alexandria, VA, USA, October 30, 2006, pp. 67-72.
·
M. Mokbel, C-Y. Chow, W.G. Aref: The New
Casper: Query Processing for Location Services without Compromising Privacy.
In Proc of VLDB 2006.
·
Man
Lung Yiu, Christian S. Jensen, Xuegang
Huang, Hua Lu: SpaceTwist: Managing the Trade-Offs Among Location Privacy,
Query Performance, and Query Accuracy in Mobile Services. In Proc of ICDE
2008.
·
G.
Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.L. Tan: Private
Queries in Location Based Services: Anonymizers are
not Necessary. 2008
International Conference on Management of Data (SIGMOD'2008), Vancouver,
Canada, June 2008, pp. 121-132.
·
H. Pang, K.L. Tan, X.
Zhou: Steganographic Schemes for File System and B-Tree. IEEE
Trans. Knowl. Data Eng. 16(6): 701-713 (2004)
·
X. Zhou, H. Pang, K.L.
Tan: Hiding
Data Accesses in Steganographic File System. ICDE
2004: 572-583
·
A. Kamra, E. Terzi,
E. Bertino: Detecting
anomalous access patterns in relational databases. VLDB J. 17(5): 1063-1077 (2008)
·
A. Kamra, E. Bertino:
Design
and Implementation of an Intrusion Response System for Relational Databases.
IEEE TKDE 23(6): 875-888 (June 2011)
·
A. Kamra, E. Bertino:
Privilege
States Based Access Control for Fine-Grained Intrusion Response. RAID 2010: 402-421