secac.bib

@comment{{This file has been generated by bib2bib 1.97}}
@comment{{Command line: /usr/bin/bib2bib -ob secac.bib -c 'class : "secac"' lib.bib}}
@inproceedings{cham02,
  title = {Optimizing the Secure Evaluation of Twig Queries},
  author = {SungRan Cho and Sihem Amer-Yahia and Laks V. S. Lakshmanan and Divesh Srivastava},
  booktitle = {Proceedings of the 28th International Conference on Very Large Data Bases (VLDB)},
  year = {2002},
  month = aug,
  pages = {490-501},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/S14P02.pdf},
  url2 = {http://www.vldb.org/conf/2002/S14P02.pdf}
}
@inproceedings{fach04,
  title = {Secure XML Querying with Security Views},
  author = {Wenfei Fan and Chee Yong Chan and Minos Garofalakis},
  booktitle = {Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'04)},
  year = {2004},
  annote = {Deals with subset of Xpath that is more general than twig queries. Defines a language for specifying access controls by annotating the document DTD, an algorithm for automatically deriving the security view (including a view DTD) from the access control specification, and an algorithm for rewriting queries defined over the view so that they can be evaluated against the base data.},
  class = {secac},
  url = {http://homepages.inf.ed.ac.uk/wenfei/papers/sigmod04-a.pdf},
  url2 = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/fach04.pdf}
}
@inproceedings{kara06,
  title = {Redundancy and Information Leakage in Fine-Grained Access Control},
  author = {Govind Kabra and Ravishankar Ramamurthy and S. Sudarshan},
  booktitle = {Proc. ACM SIGMOD international Conference on Management of Data (SIGMOD'06)},
  year = {2006},
  pages = {133-144},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/kara06.pdf}
}
@inproceedings{kige06,
  title = {Injecting Utility into Anonymized Datasets},
  author = {Daniel Kifer and J. E. Gehrke},
  booktitle = {Proc. ACM SIGMOD International Conference on Management of Data (SIGMOD'06)},
  year = {2006},
  month = jun,
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/kige06.pdf},
  url2 = {http://www.cs.cornell.edu/johannes/papers/2006/sigmod2006-inject.pdf}
}
@inproceedings{lamp71,
  title = {Protection},
  author = {Butler W. Lampson},
  booktitle = {Proc. Fifth Princeton Symposium on Information Sciences and Systems},
  year = {1971},
  month = mar,
  note = {Reprinted in Operating Systems Review, 8, 1, January 1974, pp. 18-24},
  pages = {437-443},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/lamp71.pdf}
}
@inproceedings{mage06,
  title = {l-Diversity: Privacy Beyond k-Anonymity},
  author = {Ashwin Machanavajjhala and Johannes Gehrke and Daniel Kifer and Muthuramakrishnan Venkitasubramaniam},
  booktitle = {Proc. IEEE International Conference on Data Engineering (ICDE'06)},
  year = {2006},
  month = apr,
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/mage06.pdf},
  url2 = {http://www.cs.cornell.edu/johannes/papers/2006/2006-icde-publishing.pdf}
}
@inproceedings{motr89,
  title = {An Access Authorization Model for Relational Databases Based on Algebraic Manipulation of View Definitions},
  author = {A. Motro},
  booktitle = {International Conference on Data Engineering (ICDE'89)},
  year = {1989},
  pages = {339-347},
  class = {secac}
}
@inproceedings{rime04,
  title = {Extending Query Rewriting Techniques for Fine-Grained Access Control},
  author = {Shariq Rizvi and Alberto O. Mendelzon and S. Sudarshan and Prasan Roy},
  booktitle = {Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'04)},
  year = {2004},
  annote = {Defines parameterized, user-specific authorization views over relational tables. Unlike \cite{fach04}, argues that query processing should be authorization transparent - that is, queries are expressed against the base tables, not the authorization views. Such a query is said to be valid if it can be rewritten using only authorization views. Invalid queries are rejected, so this is a go/no-go security model, like that SQL. Validity testing is undecidable unless the query language is restricted, e.g., to conjunctive queries.},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/rime04.pdf}
}
@inproceedings{rowi04,
  title = {Security of Shared Data in Large Systems},
  author = {Arnon Rosenthal and Marianne Winslett},
  booktitle = {Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'04)},
  year = {2004},
  note = {tutorial presentation},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/sig04security.pdf},
  url2 = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/sig04security.ppt}
}
@inproceedings{stfa02,
  title = {Secure {XML} Views},
  author = {Andrei Stoica and Csilla Farkas},
  booktitle = {Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security},
  year = {2002},
  month = jul,
  pages = {133-146},
  publisher = {Kluwer},
  series = {IFIP Conference Proceedings},
  volume = {256},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/secXmlViews.pdf}
}
@article{swee02,
  title = {k-Anonymity: A Model for Protecting Privacy},
  author = {Latanya Sweeney},
  journal = {International Journal on Uncertainty, Fuzziness and Knowledge-based Systems},
  year = {2002},
  number = {5},
  pages = {557-570},
  volume = {10},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/swee02.pdf},
  url2 = {http://privacy.cs.cmu.edu/people/sweeney/kanonymity.pdf}
}
@article{yusr04,
  title = {A Compressed Accessibility Map for {XML}},
  author = {Ting Yu and Divesh Srivastava and Laks V. S. Lakshmanan and H. V. Jagadish},
  journal = {ACM Transactions on Database Systems (TODS)},
  year = {2004},
  month = jun,
  number = {2},
  pages = {363-402},
  volume = {29},
  annote = {This is the journal version of \cite{yusr02}.},
  class = {secac}
}
@inproceedings{yusr02,
  title = {Compressed Accessibility Map: Efficient Access Control for {XML}},
  author = {Ting Yu and Divesh Srivastava and Laks V. S. Lakshmanan and H. V. Jagadish},
  booktitle = {Proceedings of the 28th International Conference on Very Large Data Bases (VLDB)},
  year = {2002},
  month = aug,
  pages = {478-489},
  class = {secac},
  url = {http://www.db.uwaterloo.ca/~kmsalem/lib/lib/S14P01.pdf},
  url2 = {http://www.vldb.org/conf/2002/S14P01.pdf}
}
@comment{{jabref-meta: selector_url:http://www.db.uwaterloo.ca/~kmsalem
/lib/lib/;}}
@comment{{jabref-meta: selector_class:buffer;dbcontrol;grid;other;physi
cal;queryopt;repl;resourcemgmt;secac;storagemgmt;storageperf;storagesy
s;webcontrol;workload;}}
@comment{{jabref-meta: selector_url2:http://www.db.uwaterloo.ca/~kmsale
m/lib/lib/;}}
@comment{{jabref-meta: selector_journal:#debull#;#cacm#;#corr#;#ibmsysj
#;#osreview#;#pvldb#;#queue#;#record#;#tkde#;#tods#;#tos#;#tservcomp#;
#vldbj#;}}
@comment{{jabref-meta: selector_keywords:}}
@comment{{jabref-meta: selector_booktitle:#caise#;#cidr#;#damon#;#europ
ar#;#eurosys#;#fast#;#hotos#;#icac#;#icde#;#isca#;#ladis#;#mascots#;#n
sdi#;#osdi#;#podc#;#sigmod#;#socc#;#sosp#;#usenix#;#vldb#;}}
@comment{{jabref-meta: groupsversion:3;}}
@comment{{jabref-meta: groupstree:
0 AllEntriesGroup:;
1 KeywordGroup:dbcontrol\;0\;class\;dbcontrol\;0\;0\;;
1 KeywordGroup:webcontrol\;0\;class\;webcontrol\;0\;0\;;
1 KeywordGroup:physical\;0\;class\;physical\;0\;0\;;
1 KeywordGroup:storagemgmt\;0\;class\;storagemgmt\;0\;0\;;
1 KeywordGroup:storageperf\;0\;class\;storageperf\;0\;0\;;
1 KeywordGroup:storagesys\;0\;class\;storagesys\;0\;0\;;
1 KeywordGroup:resourcemgmt\;0\;class\;resourcemgmt\;0\;0\;;
1 KeywordGroup:grid\;0\;class\;grid\;0\;0\;;
1 KeywordGroup:repl\;0\;class\;repl\;0\;0\;;
1 KeywordGroup:secac\;0\;class\;secac\;0\;0\;;
1 KeywordGroup:other\;0\;class\;other\;0\;0\;;
1 KeywordGroup:buffer\;0\;class\;buffer\;0\;0\;;
1 KeywordGroup:queryopt\;0\;class\;queryopt\;0\;0\;;
1 KeywordGroup:workload\;0\;class\;workload\;0\;0\;;
}}