Author of the publication

Finding the Leak: A Privacy Audit System for Sensitive XML Databases.

, and . ICDE Workshops, page 100. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation-Based Caching for Mobile Auctions., , , and . TAMoCo, volume 169 of Frontiers in Artificial Intelligence and Applications, page 20-31. IOS Press, (2008)A Task-Oriented Reconfigurable Software Architecture for e-Commerce Document Exchange., and . HICSS, IEEE Computer Society, (2004)Detecting Suspicious Relational Database Queries., , and . ARES, page 771-778. IEEE Computer Society, (2008)Schema-based Parallel Compression and Decompression of XML Data., , and . WEBIST, page 77-86. SciTePress, (2013)A Reconfigurable Message Oriented Middleware Architectur., and . IPDPS, page 192. IEEE Computer Society, (2003)Finding the Leak: A Privacy Audit System for Sensitive XML Databases., and . ICDE Workshops, page 100. IEEE Computer Society, (2006)XML Stream Data Reduction by Shared KST Signatures., , and . HICSS, page 1-10. IEEE Computer Society, (2009)PROTOS-L: Towards a Knowledge Base Programming Language., and . Wissensbasierte Systeme, volume 227 of Informatik-Fachberichte, page 388-400. Springer, (1989)S2CX: From relational data via SQL/XML to (Un-)Compressed XML., , and . Inf. Syst., (2016)Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants., and . JSW, 3 (1): 9-17 (2008)