Author of the publication

Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.

, , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 100-115. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures., , and . IEEE Trans. Knowl. Data Eng., 12 (6): 900-919 (2000)On the Representation of Relational Structures by Entity-Relationship Diagrams., and . ER, page 249-263. North-Holland, (1983)Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions., , and . VLDB, page 218-227. Morgan Kaufmann, (1995)Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information., , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 431-445. Springer, (1994)Steganalysis of Images Created Using Current Steganography Software., and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 273-289. Springer, (1998)Satisfiability of Quantitative Temporal Constraints with Multiple Granularities., , and . CP, volume 1330 of Lecture Notes in Computer Science, page 435-449. Springer, (1997)Maintaining privacy on derived objects., , , and . WPES, page 10-19. ACM, (2005)Implementing Semantic-Based Decomposition of Transactions., , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 75-88. Springer, (1997)Recent Advances in Access Control Models.. WAIM, volume 2762 of Lecture Notes in Computer Science, page 1. Springer, (2003)A Flexible Authorization Framework for E-Commerce., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 336-345. Springer, (2004)