Security, privacy, and authorization bibliography

2006

 * Composition and Disclosure of Unlinkable Distributed Databases. Bradley Malin, Latanya Sweeney. ICDE 2006. (poster, data privacy and security)
 * Mondrian Multidimensional K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ICDE 2006. (data privacy and security)
 * Privacy Preserving Query Processing Using Third Parties. Fatih Emek&ccedil;i, Divyakant Agrawal, Amr El Abbadi, Aziz Gulbeden. ICDE 2006. (data privacy and security)
 * Private Updates to Anonymous Databases. Alberto Trombetta, Elisa Bertino. ICDE 2006. (poster, data privacy and security)
 * Provable Security for Outsourcing Database Operations. Sergei Evdokimov, Matthias Fischmann, Oliver G&uuml;nther. ICDE 2006. (poster, data privacy and security)
 * Sovereign Joins. Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, Yaping Li. ICDE 2006. (data privacy and security)
 * Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor. ICDE 2006. (poster, data privacy and security)
 * l-Diversity: Privacy Beyond k-Anonymity. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam. ICDE 2006. (data privacy and security)

2005

 * A Framework for High-Accuracy Privacy-Preserving Mining. Shipra Agrawal, Jayant R. Haritsa. ICDE 2005. (privacy-preserving data management)
 * Assuring Security Properties in Third-party Architectures. Barbara Carminati, Elena Ferrari, Elisa Bertino. ICDE 2005. (privacy and security)
 * Automatic Composition of Transition-based Semantic Web Services with Messaging. Daniela Berardi, Diego Calvanese, Giuseppe De Giacomo, Richard Hull, Massimo Mecella. VLDB 2005. (correctness and performance)
 * Checking for k-Anonymity Violation by Views. Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia. VLDB 2005. (privacy)
 * Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, Yiheng Li. ICDE 2005. (privacy and security)
 * Data Privacy through Optimal k-Anonymization. Roberto J. Bayardo Jr., Rakesh Agrawal. ICDE 2005. (privacy-preserving data management)
 * Deriving Private Information from Randomized Data. Zhengli Huang, Wenliang Du, Biao Chen. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
 * Distributed Privacy Preserving Information Sharing. Nan Zhang, Wei Zhao. VLDB 2005. (privacy)
 * Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. Qingbo Zhu, Windsor W. Hsu. ACM SIGMOD Conference 2005. (correctness and trust)
 * Improving Performance of Cluster-based Secure Application Servers with User-level Communication. Jin-Ha Kim, Gyu Sang Choi, Chita R. Das. ICDE 2005. (privacy and security)
 * Incognito: Efficient Full-Domain K-Anonymity. Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
 * Middleware based Data Replication providing Snapshot Isolation. Yi Lin, Bettina Kemme, Marta Pati&ntilde;o-Mart&iacute;nez, Ricardo Jim&eacute;nez-Peris. ACM SIGMOD Conference 2005. (correctness and trust)
 * On k-Anonymity and the Curse of Dimensionality. Charu C. Aggarwal. VLDB 2005. (privacy)
 * Parallel Execution of Test Runs for Database Application Systems. Florian Haftmann, Donald Kossmann, Eric Lo. VLDB 2005. (correctness and performance)
 * Practical privacy: the SuLQ framework. Avrim Blum, Cynthia Dwork, Frank McSherry, Kobbi Nissim. PODS 2005. (security and privacy)
 * Privacy and Ownership Preserving of Outsourced Medical Data. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng. ICDE 2005. (privacy and security)
 * Privacy-Preserving Top-K Queries. Jaideep Vaidya, Chris Clifton. ICDE 2005. (privacy and security)
 * Privacy-enhancing k-anonymization of customer data. Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright. PODS 2005. (security and privacy)
 * Query Execution Assurance for Outsourced Databases. Radu Sion. VLDB 2005. (correctness and performance)
 * Security analysis of cryptographically controlled access to XML documents. Mart&iacute;n Abadi, Bogdan Warinschi. PODS 2005. (security and privacy)
 * Simulatable auditing. Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim. PODS 2005. (security and privacy)
 * To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh. ACM SIGMOD Conference 2005. (anonymity and nondisclosure)
 * Top-Down Specialization for Information and Privacy Preservation. Benjamin C. M. Fung, Ke Wang, Philip S. Yu. ICDE 2005. (privacy-preserving data management)
 * Verifying Completeness of Relational Query Results in Data Publishing. HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan. ACM SIGMOD Conference 2005. (correctness and trust)

2004

 * A Formal Analysis of Information Disclosure in Data Exchange. Gerome Miklau, Dan Suciu. ACM SIGMOD Conference 2004. (security and privacy)
 * A Privacy-Preserving Index for Range Queries. Bijit Hore, Sharad Mehrotra, Gene Tsudik. VLDB 2004. (privacy)
 * Extending Query Rewriting Techniques for Fine-Grained Access Control. Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, Prasan Roy. ACM SIGMOD Conference 2004. (security and privacy)
 * Order-Preserving Encryption for Numeric Data. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu. ACM SIGMOD Conference 2004. (security and privacy)
 * Resilient Rights Protection for Sensor Streams. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. VLDB 2004. (privacy)
 * Secure XML Querying with Security Views. Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis. ACM SIGMOD Conference 2004. (security and privacy)
 * Vision Paper: Enabling Privacy for the Paranoids. Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani, Utkarsh Srivastava, Dilys Thomas, Jennifer Widom, Ying Xu. VLDB 2004. (privacy)

2003

 * Information Sharing Across Private Databases. Rakesh Agrawal, Alexandre V. Evfimievski, Ramakrishnan Srikant. ACM SIGMOD Conference 2003. (data security and protection)
 * Limiting privacy breaches in privacy preserving data mining. Alexandre V. Evfimievski, Johannes Gehrke, Ramakrishnan Srikant. PODS 2003. (security and privacy)
 * Query-preserving watermarking of relational databases and XML documents. David Gross-Amblard. PODS 2003. (security and privacy)
 * Revealing information while preserving privacy. Irit Dinur, Kobbi Nissim. PODS 2003. (security and privacy)
 * Rights Protection for Relational Data. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar. ACM SIGMOD Conference 2003. (data security and protection)
 * Winnowing: Local Algorithms for Document Fingerprinting. Saul Schleimer, Daniel Shawcross Wilkerson, Alexander Aiken. ACM SIGMOD Conference 2003. (data security and protection)

1997

 * A Unified Framework for Enforcing Multiple Access Control Policies. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino. ACM SIGMOD Conference 1997. (security and commit)
 * Revisiting Commit Processing in Distributed Database Systems. Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritham. ACM SIGMOD Conference 1997. (security and commit)
 * Secure Transaction Processing in Firm Real-Time Database Systems. Binto George, Jayant R. Haritsa. ACM SIGMOD Conference 1997. (security and commit)

1992

 * Database Recovery Using Redundant Disk Arrays. Antoine N. Mourad, W. Kent Fuchs, Daniel G. Saab. ICDE 1992. (data integrity)
 * Semantically Consistent Schedules for Efficient and Concurrent B-Tree Restructuring. Ragaa Ishak. ICDE 1992. (data integrity)
 * Using Coding to Support Data Resiliency in Distributed Systems. Pankaj Jalote, Gagan Agrawal. ICDE 1992. (data integrity)

1990

 * Multilevel Secure Database Concurrency Control. Thomas F. Keefe, Wei-Tek Tsai, Jaideep Srivastava. ICDE 1990. (database security)
 * The Fingerprinted Database. Neal R. Wagner, Robert L. Fountain, Robert J. Hazy. ICDE 1990. (database security)
 * The Semantic Data Model for Security: Representing the Security Semantics of an Application. Gary W. Smith. ICDE 1990. (database security)

1989

 * An Access Authorization Model for Relational Databases Based on Algebraic Manipulation of View Definitions. Amihai Motro. ICDE 1989. (data security)
 * Password Authentication Based On Public-Key Distribution Cryptosystem. Lein Harn, David Huang, Chi-Sung Laih. ICDE 1989. (data security)
 * SDDM - A Prototype of a Distributed Architecture for Database Security. Catherine D. Jensen, Robert M. Kiel, Richard D. Verjinski. ICDE 1989. (data security)
 * The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). Joachim Biskup, Hans Hermann Br&uuml;ggemann. ICDE 1989. (data security)

1987

 * Computer Architectures, Database Security, and An Evaluation Metric. Ronda R. Henning, Brian S. Hubbard, Swen A. Walker. ICDE 1987. (panel, database security issues)

1986

 * A Controllable Prolog Database System. Naftaly H. Minsky, David Rozenshtein, Jan Chomicki. ICDE 1986. (panel, security)
 * Assessment of Data Management Security Technology for Military Requirements. V. Lakshmi Rebbapragada. ICDE 1986. (panel, security)
 * Distributed Processing Systems Security: Communications, Computer, or Both. Paul Woodie. ICDE 1986. (panel, security)
 * On Denial-of-Service in Computer Networks. Virgil D. Gligor. ICDE 1986. (panel, security)

1981

 * A Database Approach to Modelling and Managing Security Information. U. Bussolati, Giancarlo Martella. VLDB 1981. (data dictionaries and security)
 * Data Dictionaries: An Assessment of Current Practice and Problems. Robert M. Curtice. VLDB 1981. (data dictionaries and security)
 * SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases. Paul Chan, Arie Shoshani. VLDB 1981. (data dictionaries and security)
 * Synergistic Authorization in Database Systems. Naftaly H. Minsky. VLDB 1981. (data dictionaries and security)

1979

 * Data Base Management Systems Security and INGRES. Deborah Downs, Gerald J. Popek. VLDB 1979. (data base security, consistency and conversion)
 * Database Program Conversion: A Framework for Research. Robert W. Taylor, James P. Fry, Ben Shneiderman, Diane C. P. Smith, Stanley Y. W. Su. VLDB 1979. (data base security, consistency and conversion)
 * Proving Consistency of Database Transactions. Georges Gardarin, Michel A. Melkanoff. VLDB 1979. (data base security, consistency and conversion)

1978

 * Privacy and Security of Data Communications and Data Bases. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick. VLDB 1978. (survey, data base security and privacy)
 * Security and Privacy. George I. Davida. VLDB 1978. (survey, data base security and privacy)

1977

 * A Kernel Design for a Secure Data Base Management System. Deborah Downs, Gerald J. Popek. VLDB 1977. (security, integrity, recovery)
 * A Study on the Protection of Statistical Data Bases. Clement T. Yu, Francis Y. L. Chin. ACM SIGMOD Conference 1977. (data base integrity and protection)
 * Auditing Large Scale Data Bases. George M. Scott. VLDB 1977. (security, integrity, recovery)
 * Interval Hierarchies and Their Application to Predicate Files (Abstract). Kai C. Wong, Murray Edelberg. ACM SIGMOD Conference 1977. (data base integrity and protection)
 * Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (Abstract). Guy M. Lohman, John A. Muckstadt. ACM SIGMOD Conference 1977. (data base integrity and protection)
 * Protection of Information in Relational Data Bases. Fran&ccedil;ois Bancilhon, Nicolas Spyratos. VLDB 1977. (security, integrity, recovery)
 * Recovery and Carsh Resistance in a Filing System. Joost Verhofstad. ACM SIGMOD Conference 1977. (data base integrity and protection)
 * Scheduling Algorithms for Avoiding Inconsistency in Large Databases. Georges Gardarin, P. Lebeux. VLDB 1977. (security, integrity, recovery)

1975

 * Granularity of Locks in a Large Shared Data Base. Jim Gray, Raymond A. Lorie, Gianfranco R. Putzolu, Irving L. Traiger. VLDB 1975. (security and integrity)
 * On the Encipherment of Search Trees and Random Access Files. Rudolf Bayer, J. K. Metzger. VLDB 1975. (security and integrity)