Cost estimation for the key representation auditing scheme
A statistical database (SDB) publishes statistical queries (such as sum, average, count, etc) on subsets of records, and the data in individual records should be remained secret. The key representation auditing scheme is proposed to guarantee the security of online and dynamic SDBs. The core idea is...
| Main Authors: | P.D.D., Dominic, A.A., Elshiekh |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/184/ http://scholars.utp.edu.my/id/eprint/184/1/paper.pdf |
Similar Items
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Modelling of single sourcing, multiperiod, multivendor, multibuyer based VMI
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A SCM framework to describe CRM
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A decision support system for performance appraisal
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Multiattribute analysis of the offshore outsourcing location decision using a decision support system framework
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A hybrid decision model for the selection of capital equipment using AHP in conjoint analysis under fuzziness
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A Comparative Study of FP-growth Variations
by: Aiman Moyaid, Said, et al.
Published: (2009)
by: Aiman Moyaid, Said, et al.
Published: (2009)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)
by: Naseebullah, M., et al.
Published: (2010)
A Binary Replication Strategy for Large-scale Mobile Environments
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
A New Hybrid Model Based Decision Support System For Supplier Selection Process: A Case Study from Purchasing Department, UTP
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
A comparative representation approach to modern
heuristic search methods in a job shop
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Construction of zoonosis domain relationship as a preliminary stage for developing a zoonosis emerging system
by: D.R.A., Rambli, et al.
Published: (2008)
by: D.R.A., Rambli, et al.
Published: (2008)
The mold cost estimation calculator for plastic injection mold manufacturing
by: Kamalrudin, massila, et al.
Published: (2008)
by: Kamalrudin, massila, et al.
Published: (2008)
High performance in minimizing of term-document matrix representation for document clustering
by: B., Baharudin, et al.
Published: (2009)
by: B., Baharudin, et al.
Published: (2009)
A Case Study of Linear Weightage Model for Supplier Selection Process
by: Ali, A.A., et al.
Published: (2008)
by: Ali, A.A., et al.
Published: (2008)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Reference scheme reduction on subtypes in ORM
by: Carver, Andy, et al.
Published: (2013)
by: Carver, Andy, et al.
Published: (2013)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Cooperative enhanced scatter search with opposition-based learning schemes for parameter estimation in high dimensional kinetic models of biological systems
by: Muhammad Akmal, Remli, et al.
Published: (2019)
by: Muhammad Akmal, Remli, et al.
Published: (2019)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Securing wireless sensor networks with an efficient B+ tree-based key management scheme
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
Logico-linguistic semantic representation of documents
by: Wani, Sharyar, et al.
Published: (2016)
by: Wani, Sharyar, et al.
Published: (2016)
Automata representation for Abelian groups
by: Fong, Wan Heng, et al.
Published: (2013)
by: Fong, Wan Heng, et al.
Published: (2013)
Image matching using relational graph representation
by: Lai, Chui Yen
Published: (2005)
by: Lai, Chui Yen
Published: (2005)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Fundamentals of developing conceptual cost estimation models using machine learning techniques: Selection and measurement of building attributes
by: Wang, Rui, et al.
Published: (2024)
by: Wang, Rui, et al.
Published: (2024)
An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Similar Items
-
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008) -
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009) -
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009) -
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008) -
Modelling of single sourcing, multiperiod, multivendor, multibuyer based VMI
by: P.D.D., Dominic, et al.
Published: (2009)