@incollection{, 76E702E312962A5FA7D0C202381A2245 , author={{Sudheer KumarKotha} and {CH.S.V.V.S.N.Murthy} and {Jawaharlal Nehru Technical University, Kakinada.}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}121314 } @incollection{b0, , title={{Watermarking Relational Databases}} , author={{ RAgrawal } and { JKiernan }} , booktitle={{Proc. 28th Int'l Conf. Very Large Data Bases (VLDB '02), VLDB Endowment}} 28th Int'l Conf. Very Large Data Bases (VLDB '02), VLDB Endowment , year={2002} } @incollection{b1, , title={{An Algebra for Composing Access Control Policies}} , author={{ PBonatti } and { SD CDi Vimercati } and { PSamarati }} , journal={{ACM Trans. Information and System Security}} 5 1 , year={2002} } @incollection{b2, , title={{Why and Where: A Characterization of Data Provenance}} , author={{ PBuneman } and { SKhanna } and { WCTan }} , booktitle={{Proc. Eighth Int'l Conf. Database Theory (ICDT '01}} , editor={ JVBussche VVianu } Eighth Int'l Conf. Database Theory (ICDT '01 , year={Jan. 2001} } @incollection{b3, , title={{Provenance in Databases}} , author={{ PBuneman } and { W.-CTan }} , booktitle={{Proc. ACM SIGMOD}} ACM SIGMOD , year={2007} } @incollection{b4, , title={{Lineage Tracing for General Data Warehouse Transformations}} , author={{ YCui } and { JWidom }} , journal={{The VLDB J}} 12 , year={2003} } @book{b5, , title={{Digital Music Distribution and Audio Watermarking}} , author={{ SCzerwinski } and { RFromm } and { THodes }} , year={2007} } @book{b6, , title={{An Improved Algorithm to Watermark Numeric Relational Data}} , author={{ FGuo } and { JWang } and { ZZhang } and { XYe } and { DLi }} , year={2006} , publisher={Springer} , note={Information Security Applications} } @incollection{b7, , title={{Watermarking of Uncompressed and Compressed Video}} , author={{ FHartung } and { BGirod }} , journal={{Signal Processing}} 66 3 , year={1998} } @incollection{b8, , title={{Flexible Support for Multiple Access Control Policies}} , author={{ SJajodia } and { PSamarati } and { MLSapino } and { VSSubrahmanian }} , journal={{ACM Trans. Database Systems}} 26 2 , year={2001} } @incollection{b9, , title={{Fingerprinting Relational Databases: Schemes and Specialties}} , author={{ YLi } and { VSwarup } and { SJajodia }} , journal={{IEEE Trans. Dependable and Secure Computing}} 2 1 , year={Jan.-Mar. 2005} } @book{b10, , title={{Privacy, Preservation and Performance: The 3 P's of Distributed Data Management}} , author={{ BMungamuru } and { HGarcia-Molina }} , year={2008} Stanford Univ. , note={technical report} } @incollection{b11, , title={{Counting the Integer Solutions of a Linear Equation with Unit Coefficients}} , author={{ VNMurty }} , journal={{Math. Magazine}} 54 2 , year={1981} } @incollection{b12, , title={{Towards Robustness in Query Auditing}} , author={{ SUNabar } and { BMarthi } and { KKenthapadi } and { NMishra } and { RMotwani }} , booktitle={{Proc. 32nd Int'l Conf. Very Large Data Bases (VLDB '06), VLDB Endowment}} 32nd Int'l Conf. Very Large Data Bases (VLDB '06), VLDB Endowment , year={2006} } @book{b13, , title={{Data Leakage Detection}} , author={{ PPapadimitriou } and { HGarcia-Molina }} , year={2008} Stanford Univ. , note={technical report} } @incollection{b14, , title={{Quadratic Programming with One Negative Eigen value Is NP-Hard}} , author={{ PMPardalos } and { SAVavasis }} , journal={{J. Global Optimization}} 1 1 , year={1991} } @incollection{b15, , title={{Watermarking Digital Images for Copyright Protection}} , author={{ JJ K ORuanaidh } and { WJDowling } and { FMBoland }} , booktitle={{IEE Proc. Vision, Signal and Image Processing}} , year={1996} 143 } @incollection{b16, , title={{Rights Protection for Relational Data}} , author={{ RSion } and { MAtallah } and { SPrabhakar }} , booktitle={{Proc. ACM SIGMOD}} ACM SIGMOD , year={2003} } @book{b17, , title={{Achieving K-Anonymity Privacy Protection Using Generalization and Suppression}} , author={{ LSweeney }} }