References
- W. S. Ng, K. L, Tan, and A. Zhou, "A P2P-based System for Distributed Data Sharing," in Proc. 19th International Conference on Data Engineering, pp. 633-644, 2003. DOI: https://doi.org/10.1109/icde.2003.1260827.
- M. Stonebraker, P. M. Aoki, W. Litwin, A. Pfeffer, A. Sah, J. Sidell, Staelin, and A. Yu, "Mariposa: A Wide-area Distributed Database System," VLDB Journal, Vol. 5, No. 1, pp. 48-63, 1996. DOI: https://doi.org/10.3850/978-981-08-7300-4_1005.
- Z. G. Ives, A. Y. Lyer J. Madhavan, R. Pottinger. S. Saroiu, I. Tatarinov, S. Betzler, Q. Chen, E. Jaslikowska, J. Su, and W. Yeung, "Self-organizing Data Sharing Communities with SAGRES," in Proc. 2003 ACM SIGMOD International Conference on Management of Data, p. 582, June, 2000. OI: https://doi.org/10.1145/342009.335492.
- T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Maler, and F. Yergeau, "Extensible Markup Language (XML) 1.0 (forth ed.)," W3C, 2006, http://www.w3.org/TR/REC-xml.
- N. R. Adam and J. C. Wortman, "Security-Control Methods for Statistical Databases," ACM Computing Surveys, Vol. 21, No. 4, pp. 515-556, 1989. DOI: https://doi.org/10.1145/76894.76895.
- X. Yang and C. Li, "Secure XML Publishing without Information Leakage in the Presence of Data Inference," in Proc. 30th International Conference on Very Large Data Bases, pp. 96-107, 2004. DOI: https://doi.org/10.1016/b978-012088469-8.50012-7.
- A. Brodskyand, C. Farkas, and S. Jajodia, "Secure Databases: Constraints, Inference Channels, and monitoring disclosures," IEEE Transactions on Knowledge and Data Engineering, Vol. 12, No. 6, pp. 900-919, 2000. DOI: https://doi.org/10.1016/b978-012088469-8.50012-7.
- S. Castano M. G. Fugini and G. Martella, "Database Security," Addison-Wesley & ACM Press, 1995.
- G. Miklau and D. Suciu, "Controlling Access to Published Data using Cryptography," in Proc. 29th International Conference on Very Large Data Bases, pp. 898-909, 2003. DOI: https://doi.org/10.1016/b978-012722442-8/50084-7.
- J. G. Lee and K. Y. Whang, "Secure Query Processing against Encrypted XML Data using Query-Aware Decryption," Information Sciences, Vol. 176, No. 13, pp. 1928-1947, 2006. DOI: https://doi.org/10.1016/j.ins.2005.08.001.
- E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, "Controlling Access and Dissemination of XML Document," in Proc. 2nd International Workshop on Web Information and Data Management, pp. 22-27, 1999. DOI: https://doi.org/10.1145/319759.319770.
- H. Ko and S. Lee, "A Binary String Approach for Updates in Dynamic Ordered XML Data," IEEE Transactions on Knowledge and Data Engineering," Vol. 22, No. 4, pp. 602-607, 2010. DOI: https://doi.org/10.1109/tkde.2009.87.
- D. Dobkin, A. K. Jones, and R. J. Lipton, "Secure Databases: Protection against User Influence," ACM Trans. Database System, Vol. 4, No. 1, pp. 97-106, 1979. DOI: https://doi.org/10.1145/320064.320068.
- S. H. Yoon, K. S. Lee, C. J. Sang, T. Khudaybergenov, M. S. Kim, D. G. Woo, and J. U. Kim, "Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication," The International Journal of Internet, Broadcasting and Communication (IJIBC), Vol. 12, No. 2, pp. 1-7, 2020. DOI: https://doi.org/10.7236/JIJBC.2020.12.2.1.
- Y. Seo and Y. Chang, "A Study for Applicating and Introducing the Right to be Forgotten," The Journal of Convergence on Culture Technology (JCCT), Vol. 2, No. 3, pp. 23-28, 2016. DOI: https://doi.org/10.17703/JCCT.2016.2.3.23.