| 2009 |
27 | | Abhinav Parate,
Gerome Miklau:
A framework for safely publishing communication traces.
CIKM 2009: 1469-1472 |
26 | | Wentian Lu,
Gerome Miklau:
Auditing a Database under Retention Restrictions.
ICDE 2009: 42-53 |
25 | | Michael Hay,
Chao Li,
Gerome Miklau,
David Jensen:
Accurate Estimation of the Degree Distribution of Private Networks.
ICDM 2009: 169-178 |
24 | | Vibhor Rastogi,
Michael Hay,
Gerome Miklau,
Dan Suciu:
Relationship privacy: output perturbation for queries with joins.
PODS 2009: 107-116 |
23 | | Brian Neil Levine,
Gerome Miklau:
Auditing and Forensic Analysis.
Encyclopedia of Database Systems 2009: 172-176 |
22 | | Michael Hay,
Vibhor Rastogi,
Gerome Miklau,
Dan Suciu:
Boosting the Accuracy of Differentially-Private Queries Through Consistency
CoRR abs/0904.0942: (2009) |
21 | | Chao Li,
Michael Hay,
Vibhor Rastogi,
Gerome Miklau,
Andrew McGregor:
Optimizing Histogram Queries under Differential Privacy
CoRR abs/0912.4742: (2009) |
| 2008 |
20 | | Hala Mostafa,
Victor R. Lesser,
Gerome Miklau:
Self-interested database managers playing the view maintenance game.
AAMAS (2) 2008: 871-878 |
19 | | Bruno F. Ribeiro,
Weifeng Chen,
Gerome Miklau,
Donald F. Towsley:
Analyzing Privacy in Enterprise Packet Trace Anonymization.
NDSS 2008 |
18 | | Michael Hay,
Gerome Miklau,
David Jensen,
Donald F. Towsley,
Philipp Weis:
Resisting structural re-identification in anonymized social networks.
PVLDB 1(1): 102-114 (2008) |
17 | | Wentian Lu,
Gerome Miklau:
AuditGuard: a system for database auditing under retention restrictions.
PVLDB 1(2): 1484-1487 (2008) |
| 2007 |
16 | | Gerome Miklau,
Brian Neil Levine,
Patrick Stahlberg:
Securing history: Privacy and accountability in database systems.
CIDR 2007: 387-396 |
15 | | Patrick Stahlberg,
Gerome Miklau,
Brian Neil Levine:
Threats to privacy in the forensic analysis of database systems.
SIGMOD Conference 2007: 91-102 |
14 | | Gerome Miklau,
Dan Suciu:
A formal analysis of information disclosure in data exchange.
J. Comput. Syst. Sci. 73(3): 507-534 (2007) |
| 2005 |
13 | | Gerome Miklau,
Dan Suciu:
Implementing a Tamper-Evident Database System.
ASIAN 2005: 28-48 |
12 | | Nilesh N. Dalvi,
Gerome Miklau,
Dan Suciu:
Asymptotic Conditional Probabilities for Conjunctive Queries.
ICDT 2005: 289-305 |
11 | | Gerome Miklau,
Dan Suciu:
Managing Integrity for Data Exchanged on the Web.
WebDB 2005: 13-18 |
| 2004 |
10 | | Gerome Miklau,
Dan Suciu:
A Formal Analysis of Information Disclosure in Data Exchange.
SIGMOD Conference 2004: 575-586 |
9 | | Gerome Miklau,
Dan Suciu:
Modeling Integrity in Data Exchange.
Secure Data Management 2004: 41-54 |
8 | | Todd J. Green,
Ashish Gupta,
Gerome Miklau,
Makoto Onizuka,
Dan Suciu:
Processing XML streams with deterministic automata and stream indexes.
ACM Trans. Database Syst. 29(4): 752-788 (2004) |
7 | | Gerome Miklau,
Dan Suciu:
Enabling Secure Data Exchange.
IEEE Data Eng. Bull. 27(1): 34-41 (2004) |
6 | | Gerome Miklau,
Dan Suciu:
Containment and equivalence for a fragment of XPath.
J. ACM 51(1): 2-45 (2004) |
| 2003 |
5 | | Todd J. Green,
Gerome Miklau,
Makoto Onizuka,
Dan Suciu:
Processing XML Streams with Deterministic Automata.
ICDT 2003: 173-189 |
4 | | Gerome Miklau,
Dan Suciu:
Controlling Access to Published Data Using Cryptography.
VLDB 2003: 898-909 |
3 | | Igor Tatarinov,
Zachary G. Ives,
Jayant Madhavan,
Alon Y. Halevy,
Dan Suciu,
Nilesh N. Dalvi,
Xin Dong,
Yana Kadiyska,
Gerome Miklau,
Peter Mork:
The Piazza peer data management project.
SIGMOD Record 32(3): 47-52 (2003) |
| 2002 |
2 | | Gerome Miklau,
Dan Suciu:
Containment and Equivalence for an XPath Fragment.
PODS 2002: 65-76 |
1 | | Gerome Miklau,
Dan Suciu:
Cryptographically Enforced Conditional Access for XML.
WebDB 2002: 101-106 |