On Security of Sovereign Joins.
Einar MykletunGene TsudikPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- information security
- security requirements
- access control
- intrusion detection
- query optimization
- network security
- security issues
- security problems
- security policies
- security systems
- data security
- information assurance
- databases
- security threats
- security level
- cyber security
- information systems
- security analysis
- key management
- security mechanisms
- security model
- statistical databases
- query evaluation
- database management systems
- neural network