• Publications
  • Influence
Dynamic and Efficient Key Management for Access Hierarchies
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). Expand
  • 421
  • 33
  • PDF
Watermarking Relational Databases
  • 205
  • 29
  • PDF
Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research
This study reports a meta-analysis of empirical studies on Internet addiction published in academic journals for the period 1996-2006. Expand
  • 410
  • 28
  • PDF
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006
Internet addiction is ''an individual's inability to control their Internet use, which in turn leads to feelings of distress and functional impairment of daily activities''. Expand
  • 303
  • 25
  • PDF
Secure multi-party computation problems and their applications: a review and open problems
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. Expand
  • 417
  • 24
  • PDF
Rights protection for relational data
we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areasExpand
  • 256
  • 21
  • PDF
Disclosure limitation of sensitive rules
Data products (macrodata or tabular data and micro-data or raw data records), are designed to inform public or business policy, and research or public information. Securing these products againstExpand
  • 476
  • 20
  • PDF
Algorithms and Theory of Computation Handbook
  • M. Atallah
  • Computer Science
  • Chapman & Hall/CRC Applied Algorithms and Data…
  • 20 November 2009
Algorithms and Theory of Computation Handbook, Second Edition provides an up-to-date compendium of fundamental computer science topics and techniques. Expand
  • 525
  • 19
Securely outsourcing linear algebra computations
We give improved protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of large matrices) to a remote server, such that the server learns nothing about the customer's private input or the result of the computation, and any attempted corruption of the answer by the server is detected with high probability. Expand
  • 290
  • 18
Privacy-preserving cooperative statistical analysis
  • Wenliang Du, M. Atallah
  • Computer Science
  • Seventeenth Annual Computer Security Applications…
  • 10 December 2001
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Expand
  • 292
  • 18
  • PDF