A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A framework for high assurance security of distributed objects
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Database Security Integration using Role-Based Access Control
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
User Authentication in Multidatabase Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Power: A Metric for Evaluating Watermarking Algorithms
ITCC '02 Proceedings of the International Conference on Information Technology: Coding and Computing
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
SUPPORTING SECURITY REQUIREMENTS IN MULTILEVEL REAL-TIME DATABASES
SUPPORTING SECURITY REQUIREMENTS IN MULTILEVEL REAL-TIME DATABASES
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing
Proceedings of the 2005 workshop on Digital identity management
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Ownership protection of shape datasets with geodesic distance preservation
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A new watermark approach for protection of databases
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
A Generic Distortion Free Watermarking Technique for Relational Databases
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
The multi-bit watermarking method for speech signals in the time-frequency domain
Integrated Computer-Aided Engineering
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A novel relational database watermarking algorithm
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
A novel watermark technique for relational databases
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Query-preserving watermarking of relational databases and Xml documents
ACM Transactions on Database Systems (TODS)
Tabu search based multi-watermarks embedding algorithm with multiple description coding
Information Sciences: an International Journal
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part I
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
GARWM: towards a generalized and adaptive watermark scheme for relational data
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Watermarking geographical data on spatial topological relations
Multimedia Tools and Applications
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Right-protected data publishing with hierarchical clustering preservation
Proceedings of the 21st ACM international conference on Information and knowledge management
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
A reversible watermarking authentication scheme for wireless sensor networks
Information Sciences: an International Journal
Genetic algorithm and difference expansion based reversible watermarking for relational databases
Journal of Systems and Software
Hi-index | 0.00 |
In this paper, we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it. Different avenues are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counterpart, for example, watermarking. While being able to handle higher level semantic constraints, such as classification preservation, our solution also addresses important attacks, such as subset selection and random and linear data changes. We introduce wmdb.*, a proof-of-concept implementation and its application to real-life data, namely, in watermarking the outsourced Wal-Mart sales data that we have available at our institute.