72 results on '"Paraboschi, S."'
Search Results
2. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
3. Metadata Management in Outsourced Encrypted Databases
4. XML Access Control Systems: A Component-Based Approach
5. Regulating Access to Semistructured Information on the Web
6. Selective Data Encryption in Outsourced Dynamic Environments
7. Securing SOAP e-services
8. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
9. XML Access Control Systems: A Component-Based Approach
10. Regulating Access to Semistructured Information on the Web
11. Towards adaptive access control
12. Basi di dati: Architetture e Linee di Evoluzione
13. Basi di dati- 4/ed - Modelli e linguaggi di interrogazione
14. Basi di dati - Modelli e linguaggi di interrogazione 3/ed
15. Basi di dati - Modelli e linguaggi di interrogazione 2/ed
16. Supporting concurrency and multiple indexes in private access to outsourced data
17. Authorization enforcement in distributed query evaluation
18. Basi di dati - Concetti, linguaggi e architetture 2/a ed
19. Preserving confidentiality of security policies in data outsourcing scenarios
20. Basi di dati - Concetti, linguaggi e architetture
21. Basi di dati: Modelli, Linguaggi e Architetture
22. A protocol for reputation management in super-peer networks
23. Access Control Models for XML
24. Flexible and scalable digital library search
25. Compile-time and Run-time Analysis of Active Behaviors
26. On information leakage by indexes over data fragments
27. Materialized View Selection in a Multidimensional Database
28. Expressive and Deployable Access Control in Open Web Service Applications
29. Encryption-Based Policy Enforcement for Cloud Storage
30. The LOGRES prototypeProceedings of the 1993 ACM SIGMOD international conference on Management of data - SIGMOD '93
31. Efficient and Private Access to Outsourced Data.
32. Managing and sharing servents' reputations in P2P systems
33. Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
34. Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
35. Encryption-Based Policy Enforcement for Cloud Storage.
36. Effective scheduling of detached rules in active databases
37. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
38. Access Control Models for XML.
39. Controlled Information Sharing in Collaborative Distributed Query Processing.
40. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
41. Metadata Management in Outsourced Encrypted Databases.
42. P2P-based collaborative spam detection and filtering.
43. Controlling access to XML documents
44. Building a database design laboratory on the Internet
45. Compile-time and runtime analysis of active behaviors
46. The IDEA tool set
47. Ordering and selecting production rules for constraint maintenance: complexity and heuristic solution
48. The LOGRES prototype
49. LOGRES prototype
50. Implementing a reputation-aware gnutella servent
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.