2009 Fourth International Conference on Internet Monitoring and Protection 2009
DOI: 10.1109/icimp.2009.15
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Privacy Implementations of Database Enquiries

Abstract: Full bibliographic details must be given when referring to, or quoting from full items including the author's name, the title of the work, publication details where relevant (place, publisher, date), pagination, and for theses or dissertations the awarding institution, the degree type awarded, and the date of the award.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…In earlier work, we have used Erlang to support privacy for data enquiries [7]. The current work spells out an alternative approach already discussed in this earlier paper.…”
Section: Discussionmentioning
confidence: 99%
“…In earlier work, we have used Erlang to support privacy for data enquiries [7]. The current work spells out an alternative approach already discussed in this earlier paper.…”
Section: Discussionmentioning
confidence: 99%
“…The Isabelle proof is about 200 lines of proof script (see [8]). The new characterization given by Theorem 4.1 is a refined version of Theorem 2.2.…”
Section: Proofmentioning
confidence: 99%
“…The proved algorithm for checking a relation for idempotence can now be used to filter out and count idempotents. To this end, we use a simple function suc rel (see [8]) that enumerates all relations over {1, . .…”
Section: Coding Issuesmentioning
confidence: 99%
See 2 more Smart Citations