| 2009 |
11 | | Ji-Won Byun,
Tiancheng Li,
Elisa Bertino,
Ninghui Li,
Yonglak Sohn:
Privacy-preserving incremental data dissemination.
Journal of Computer Security 17(1): 43-68 (2009) |
10 | | Chenyun Dai,
Gabriel Ghinita,
Elisa Bertino,
Ji-Won Byun,
Ninghui Li:
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
PVLDB 2(2): 1618-1621 (2009) |
| 2008 |
9 | | Ji-Won Byun,
Ninghui Li:
Purpose based access control for privacy protection in relational database systems.
VLDB J. 17(4): 603-619 (2008) |
| 2007 |
8 | | Ji-Won Byun,
Ashish Kamra,
Elisa Bertino,
Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques.
DASFAA 2007: 188-200 |
7 | | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 |
6 | | Ninghui Li,
Ji-Won Byun,
Elisa Bertino:
A Critique of the ANSI Standard on Role-Based Access Control.
IEEE Security & Privacy 5(6): 41-49 (2007) |
| 2006 |
5 | | Ji-Won Byun,
Yonglak Sohn,
Elisa Bertino:
Systematic control and management of data integrity.
SACMAT 2006: 101-110 |
4 | | Ji-Won Byun,
Yonglak Sohn,
Elisa Bertino,
Ninghui Li:
Secure Anonymization for Incremental Datasets.
Secure Data Management 2006: 48-63 |
3 | | Ji-Won Byun,
Elisa Bertino:
Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges.
SIGMOD Record 35(1): 9-13 (2006) |
| 2005 |
2 | | Elisa Bertino,
Ji-Won Byun,
Ninghui Li:
Privacy-Preserving Database Systems.
FOSAD 2005: 178-206 |
1 | | Ji-Won Byun,
Elisa Bertino,
Ninghui Li:
Purpose based access control of complex data for privacy protection.
SACMAT 2005: 102-110 |