Author of the publication

Finding the Leak: A Privacy Audit System for Sensitive XML Databases.

, and . ICDE Workshops, page 100. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized Internet Search Based on a Intersection Test for XPath Expressions under a DTD., and . International Conference on Internet Computing, page 587-593. CSREA Press, (2004)Evaluating XPath Queries on XML Data Streams., and . BNCOD, volume 4587 of Lecture Notes in Computer Science, page 101-113. Springer, (2007)06431 Working Group Report on Managing and Integrating Data in P2P Databases., , , , , , , , , and 5 other author(s). Scalable Data Management in Evolving Networks, volume 06431 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)A Subset Test for XPath Expressions under DTDs., and . BNCOD Posters, page 43-45. aka / IOS Press / infix, (2003)Information Disclosure by XPath Queries., and . Secure Data Management, volume 4165 of Lecture Notes in Computer Science, page 160-174. Springer, (2006)Testing Containment of XPath Expressions in Order to Reduce the Data Transfer to Mobile Clients., and . ADBIS, volume 2798 of Lecture Notes in Computer Science, page 400-410. Springer, (2003)Finding the Leak: A Privacy Audit System for Sensitive XML Databases., and . ICDE Workshops, page 100. IEEE Computer Society, (2006)A DTD Graph Based XPath Query Subsumption Test., and . Xsym, volume 2824 of Lecture Notes in Computer Science, page 85-99. Springer, (2003)Embedding XML Schema Constraints in Search-Based Intersection Tests for XPath Query Optimization., and . DEXA Workshops, page 842-846. IEEE Computer Society, (2005)Data Management for Mobile Ajax Web 2.0 Applications., and . DEXA, volume 4653 of Lecture Notes in Computer Science, page 424-433. Springer, (2007)