A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Power: A Metric for Evaluating Watermarking Algorithms
ITCC '02 Proceedings of the International Conference on Information Technology: Coding and Computing
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
wmdb.*: Rights Protection for Numeric Relational Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
WmXML: a system for watermarking XML data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
The Indiana Center for Database Systems at Purdue University
ACM SIGMOD Record
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Fingerprinting relational databases
Proceedings of the 2006 ACM symposium on Applied computing
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
Proceedings of the 2007 ACM symposium on Applied computing
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Embedding and Retrieving Private Metadata in Electrocardiograms
Journal of Medical Systems
A new watermarking approach for relational data
Proceedings of the 46th Annual Southeast Regional Conference on XX
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
An algorithm resistive to invertibility attack in watermarking relational databases
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
An authentication method for self nodes based on watermarking in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Geo-WDBMS: an improved DBMS with the function of watermarking geographical data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Watermarking spatial trajectory database
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
An improved algorithm to watermark numeric relational data
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A new scheme to fingerprint XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
Watermarking road maps against crop and merge attacks
Proceedings of the first ACM workshop on Information hiding and multimedia security
Generalizing database forensics
ACM Transactions on Database Systems (TODS)
Hi-index | 0.00 |
Protecting rights over relational data is of ever increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it.Different avenues for rights protection are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counter-part, for example watermarking.Recent research of the authors introduces the issue of digital watermarking for generic number sets. In the present paper we expand on this foundation and introduce a solution for relational database content rights protection through watermarking.Our solution addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data). Our watermark also survives up to 50% and above data loss.Finally we present wmdb.*, a proof-of-concept implementation of our algorithm and its application to real life data, namely in watermarking the outsourced Wal-Mart sales data that we have available at our institute.