Author of the publication

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.

, , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 263-273. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing., , , , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 201-216. Springer, (2012)Database as a Service: Towards a Unified Solution for Security Requirements., , , and . COMPSAC Workshops, page 415-420. IEEE Computer Society, (2012)Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach., , , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 343-351. Springer, (2012)Access control enforcement on outsourced data ensuring privacy of access control policies., , and . HPCS, page 491-497. IEEE, (2011)Access control aware data retrieval for secret sharing based database outsourcing., , and . Distributed Parallel Databases, 34 (4): 505-534 (2016)k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 263-273. Springer, (2012)Software Security; A Vulnerability Activity Revisit., , , and . ARES, page 866-872. IEEE Computer Society, (2008)A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 374-378. Springer, (2011)Threat Extraction in IoT-Based Systems Focusing on Smart Cities., and . ISCISC, page 92-98. IEEE, (2019)Threat Extraction Method Based on UML Software Description., and . ISCISC, page 1-8. IEEE, (2018)