Query Processing Techniques for Compliance with Data Confidence Policies. Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., & Thuraisingham, B. In Jonker, W. & Petkovic, M., editors, Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, volume 5776, of Lecture Notes in Computer Science, pages 49–67, 2009. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/sdmw/DaiLKBCT09,
author = {Chenyun Dai and
Dan Lin and
Murat Kantarcioglu and
Elisa Bertino and
Ebru Celikel and
Bhavani Thuraisingham},
editor = {Willem Jonker and
Milan Petkovic},
title = {Query Processing Techniques for Compliance with Data Confidence Policies},
booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
August 28, 2009. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5776},
pages = {49--67},
publisher = {Springer},
year = {2009},
url = {https://doi.org/10.1007/978-3-642-04219-5\_4},
doi = {10.1007/978-3-642-04219-5\_4},
timestamp = {Wed, 29 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"jWDCzpZHQ5tNu4bBi","bibbaseid":"dai-lin-kantarcioglu-bertino-celikel-thuraisingham-queryprocessingtechniquesforcompliancewithdataconfidencepolicies-2009","authorIDs":[],"author_short":["Dai, C.","Lin, D.","Kantarcioglu, M.","Bertino, E.","Celikel, E.","Thuraisingham, B."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Chenyun"],"propositions":[],"lastnames":["Dai"],"suffixes":[]},{"firstnames":["Dan"],"propositions":[],"lastnames":["Lin"],"suffixes":[]},{"firstnames":["Murat"],"propositions":[],"lastnames":["Kantarcioglu"],"suffixes":[]},{"firstnames":["Elisa"],"propositions":[],"lastnames":["Bertino"],"suffixes":[]},{"firstnames":["Ebru"],"propositions":[],"lastnames":["Celikel"],"suffixes":[]},{"firstnames":["Bhavani"],"propositions":[],"lastnames":["Thuraisingham"],"suffixes":[]}],"editor":[{"firstnames":["Willem"],"propositions":[],"lastnames":["Jonker"],"suffixes":[]},{"firstnames":["Milan"],"propositions":[],"lastnames":["Petkovic"],"suffixes":[]}],"title":"Query Processing Techniques for Compliance with Data Confidence Policies","booktitle":"Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings","series":"Lecture Notes in Computer Science","volume":"5776","pages":"49–67","publisher":"Springer","year":"2009","url":"https://doi.org/10.1007/978-3-642-04219-5\\_4","doi":"10.1007/978-3-642-04219-5_4","timestamp":"Wed, 29 Jun 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/sdmw/DaiLKBCT09,\n author = {Chenyun Dai and\n Dan Lin and\n Murat Kantarcioglu and\n Elisa Bertino and\n Ebru Celikel and\n Bhavani Thuraisingham},\n editor = {Willem Jonker and\n Milan Petkovic},\n title = {Query Processing Techniques for Compliance with Data Confidence Policies},\n booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,\n August 28, 2009. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {5776},\n pages = {49--67},\n publisher = {Springer},\n year = {2009},\n url = {https://doi.org/10.1007/978-3-642-04219-5\\_4},\n doi = {10.1007/978-3-642-04219-5\\_4},\n timestamp = {Wed, 29 Jun 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Dai, C.","Lin, D.","Kantarcioglu, M.","Bertino, E.","Celikel, E.","Thuraisingham, B."],"editor_short":["Jonker, W.","Petkovic, M."],"key":"DBLP:conf/sdmw/DaiLKBCT09","id":"DBLP:conf/sdmw/DaiLKBCT09","bibbaseid":"dai-lin-kantarcioglu-bertino-celikel-thuraisingham-queryprocessingtechniquesforcompliancewithdataconfidencepolicies-2009","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-04219-5\\_4"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/36/195.bib","creationDate":"2020-09-11T22:37:03.067Z","downloads":0,"keywords":[],"search_terms":["query","processing","techniques","compliance","data","confidence","policies","dai","lin","kantarcioglu","bertino","celikel","thuraisingham"],"title":"Query Processing Techniques for Compliance with Data Confidence Policies","year":2009,"dataSources":["28bNN5KFLRLRJ3Swj","p58ogefjcnmT9df9R","akkTAC3Guiza8iv6k"]}