A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A framework for high assurance security of distributed objects
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Database Security Integration using Role-Based Access Control
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
User Authentication in Multidatabase Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Supporting security requirements in multilevel real-time databases
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
A New Watermark Mechanism for Relational Data
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fingerprinting relational databases
Proceedings of the 2006 ACM symposium on Applied computing
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Hi-index | 0.00 |
Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This possesses threats in various forms to the owner of the digital information. In this paper we focus on copyright issue and propose a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in the relational database. It is achieved by formulating a watermarking method, which will watermark only the numeric attributes. This introduces a new way of dividing the database into different subsets and a meaningful watermark is embedded into database. Proposed watermarking technique avoids the synchronization problems and is resilient to subset selection attack, alteration attack, attribute cutting attack and subset addition attack.