Pseudo-random permutation generators and cryptographic composition
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
ACM SIGSAC Review
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
System = program + users + law
ICAIL '87 Proceedings of the 1st international conference on Artificial intelligence and law
On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
Communications of the ACM
A unified approach for multilevel database security based on inference engines
SIGCSE '89 Proceedings of the twentieth SIGCSE technical symposium on Computer science education
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
A VLSI Architecture for Fast Inversion in GF(2/sup m/)
IEEE Transactions on Computers
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
IEEE Transactions on Software Engineering
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
IEEE Transactions on Software Engineering
ABYSS: An Architecture for Software Protection
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
Concurrency control in multilevel-secure databases based on replicated architecture
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Adequacy of checksum algorithms for computer virus detection
SIGSMALL '90 Proceedings of the 1990 ACM SIGSMALL/PC symposium on Small systems
Communications of the ACM
PODS '91 Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Adequacy of checksum algorithms for computer virus detection
ACM SIGSMALL/PC Notes
Communications of the ACM
ACM SIGSAC Review
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Distributed timestamp generation in planar lattice networks
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
Breaking Substitution Cyphers Using Stochastic Automata
IEEE Transactions on Pattern Analysis and Machine Intelligence
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A graduate course in computing security technology
SIGCSE '93 Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
Cryptography for PC/workstation security
ACM SIGICE Bulletin
Inferential security in individual computing environments
ACM SIGICE Bulletin
A mathematical framework to implement statistical databases
ACM SIGSAC Review
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
An efficient multiversion algorithm for secure servicing of transaction reads
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Secured systems and Ada: a trusted system software architecture
TRI-Ada '94 Proceedings of the conference on TRI-Ada '94
A New Public-Key Cipher System Based Upon the Diophantine Equations
IEEE Transactions on Computers
ACM Computing Surveys (CSUR)
McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes
Designs, Codes and Cryptography
A new public key cryptosystem based on higher residues
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Exception-based information flow control in object-oriented systems
ACM Transactions on Information and System Security (TISSEC)
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Journal of the ACM (JACM)
Communications of the ACM
Secrecy by typing in security protocols
Journal of the ACM (JACM)
A network technique to achieve program and data security with nominal communications overhead
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
Performance and Stability Analysis of Multilevel Data Structures with Deferred Reorganization
IEEE Transactions on Software Engineering
A deterrent to linear system inferential attacks using a mediator
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
Secure transaction management and query processing in multilevel secure database systems
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Information flow inference for free
ICFP '00 Proceedings of the fifth ACM SIGPLAN international conference on Functional programming
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Balancing cooperation and risk in intrusion detection
ACM Transactions on Information and System Security (TISSEC)
New Systolic Arrays for C + AB2, Inversion, and Division in GF(2m)
IEEE Transactions on Computers
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
Managing security policies in a distributed environment using eXtensible markup language (XML)
Proceedings of the 2001 ACM symposium on Applied computing
IEEE Transactions on Computers
Communication security in a distributed network
ACM SIGSAC Review
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Information flow inference for ML
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Improvements to systematic program development
ACM-SE 30 Proceedings of the 30th annual Southeast regional conference
Context-agile encryption for high speed communication networks
ACM SIGCOMM Computer Communication Review
Architectural tradeoff in implementing RSA processors
ACM SIGARCH Computer Architecture News
Challenges for copyright in a digital age
BT Technology Journal
Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme
Electronic Commerce Research
Information flow inference for ML
ACM Transactions on Programming Languages and Systems (TOPLAS)
Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
Multimedia Tools and Applications
Panoptis: intrusion detection using a domain-specific language
Journal of Computer Security
IEEE Parallel & Distributed Technology: Systems & Technology
Intrusion Detection via System Call Traces
IEEE Software
A Systolic Architecture for Computing Inverses and Divisions in Finite Fields GF(2/sup m/)
IEEE Transactions on Computers
Bit-Level Systolic Array for Fast Exponentiation in GF(2/sup m/)
IEEE Transactions on Computers
Improved Digital Signature Algorithm
IEEE Transactions on Computers
A Search of Minimal Key Functions for Normal Basis Multipliers
IEEE Transactions on Computers
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
Storage Efficient and Secure Replicated Distributed Databases
IEEE Transactions on Knowledge and Data Engineering
Foundations of Secure Deductive Databases
IEEE Transactions on Knowledge and Data Engineering
The Partitioned Synchronization Rule for Planar Extendible Partial Orders
IEEE Transactions on Knowledge and Data Engineering
A MAC Policy Framework for Multilevel Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
A Semantic Framework of the Multilevel Secure Relational Model
IEEE Transactions on Knowledge and Data Engineering
Cell Suppression Methodology: The Importance of Suppressing Marginal Totals
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
Advanced Transaction Processing in Multilevel Secure File Stores
IEEE Transactions on Knowledge and Data Engineering
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Practical Data-Oriented Microaggregation for Statistical Disclosure Control
IEEE Transactions on Knowledge and Data Engineering
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
Globally Consistent Event Ordering in One-Directional Distributed Environments
IEEE Transactions on Parallel and Distributed Systems
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
Framework for the Security Component of an Ada DBMS
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
The Theory of Probabilistic Databases
VLDB '87 Proceedings of the 13th International Conference on Very Large Data Bases
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
Providing Dynamic Security Control in a Federated Database
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
A probabilistic approach to information hiding
Programming methodology
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Managing data flow in a DAC supporting security system
Journal of Network and Computer Applications
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Static verification of security requirements in role based CSCW systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
Proceedings of the 25th International Conference on Software Engineering
An efficient key assignment scheme based on one-way hash function in a user hierarchy
Journal of Computer Science and Technology
Joint encryption and error correction schemes
ISCA '84 Proceedings of the 11th annual international symposium on Computer architecture
ICCC '02 Proceedings of the 15th international conference on Computer communication
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
The inference problem and updates in relational databases
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Privacy in multidimensional databases
Multidimensional databases
Systolic architectures for inversion/division using AB2 circuits in GF(2m)
Integration, the VLSI Journal
Remote access systems for statistical analysis of microdata
Statistics and Computing
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
New Systolic Architectures for Inversion and Division in GF(2^m)
IEEE Transactions on Computers
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Journal of Functional Programming
The butt of the iceberg: hidden security problems of ubiquitous systems
Ambient intelligence
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
A formal analysis of information disclosure in data exchange
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
Modeling and assessing inference exposure in encrypted databases
ACM Transactions on Information and System Security (TISSEC)
Modern trends in authentication
ACM SIGSAC Review - Resources: part II
A logical approach to multilevel security of probabilistic systems
Distributed Computing
Cardinality-based inference control in data cubes
Journal of Computer Security
Encyclopedia of Computer Science
Ringed bit-parallel systolic multipliers over a class of fields GF(2m)
Integration, the VLSI Journal
Fast dictionary attacks on passwords using time-space tradeoff
Proceedings of the 12th ACM conference on Computer and communications security
Features of a system for statistical databases
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
A security model for the statistical database problem
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
On the security of individual data
Annals of Mathematics and Artificial Intelligence
An empirical study of the strength of information flows in programs
Proceedings of the 2006 international workshop on Dynamic systems analysis
Analysis of non-linear pseudo-noise sequences
Enhanced methods in computer security, biometric and artificial intelligence systems
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
Enforcing robust declassification and qualified robustness
Journal of Computer Security - Special issue on CSFW17
Access control in a core calculus of dependency
Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming
Masking page reference patterns in encryption databases on untrusted storage
Data & Knowledge Engineering - Special issue: ER 2004
Journal of Cognitive Neuroscience
Assessing security threats of looping constructs
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A novel image-hiding scheme based on block difference
Pattern Recognition
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
Managing user relationships in hierarchies for information system security
Decision Support Systems
An epistemic framework for privacy protection in database linking
Data & Knowledge Engineering
Access Control in a Core Calculus of Dependency
Electronic Notes in Theoretical Computer Science (ENTCS)
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Computer and System Sciences
Quantitative analysis of leakage for multi-threaded programs
Proceedings of the 2007 workshop on Programming languages and analysis for security
Towards a logical account of declassification
Proceedings of the 2007 workshop on Programming languages and analysis for security
Cryptographic relational algebra for databases using the field authenticator
Computers & Mathematics with Applications
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Controlled query evaluation with open queries for a decidable relational submodel
Annals of Mathematics and Artificial Intelligence
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A blind source separation-based method for multiple images encryption
Image and Vision Computing
Concurrency control based on role concept
International Journal of High Performance Computing and Networking
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
A static analysis for quantifying information flow in a simple imperative language
Journal of Computer Security
Lagrange multipliers and maximum information leakage in different observational models
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
ACM Transactions on Information and System Security (TISSEC)
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
Information systems security and human behaviour
Behaviour & Information Technology
Fairness in multi-agent systems
The Knowledge Engineering Review
Securing information flow via dynamic capture of dependencies
Journal of Computer Security - 20th IEEE Computer Security Foundations Symposium (CSF)
Algorithms and tool support for dynamic information flow analysis
Information and Software Technology
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Impacts of information system vulnerabilities on society
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Success probability of the Hellman trade-off
Information Processing Letters
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
Quantifying maximal loss of anonymity in protocols
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Flexible authentication framework with bound authentication and authorization
WSEAS TRANSACTIONS on COMMUNICATIONS
Measuring channel capacity to distinguish undue influence
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
Online data storage using implicit security
Information Sciences: an International Journal
An Interval-based Abstraction for Quantifying Information Flow
Electronic Notes in Theoretical Computer Science (ENTCS)
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
HengHa: data harvesting detection on hidden databases
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
Hi-index | 0.13 |
From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles. There are many references for those who would like to study specific topics further. Data security has evolved rapidly since 1975. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. We have developed techniques for verifying that programs do not leak confidential data, or transmit classified data to users with lower security clearances. We have found new controls for protecting data in statistical databases--and new methods of attacking these databases. We have come to a better understanding of the theoretical and practical limitations to security.