Lena Wiese

According to our database1, Lena Wiese authored at least 59 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Big Data Technologies for DNA Sequencing.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Inference Attacks on Fuzzy Searchable Encryption Schemes.
Transactions on Data Privacy, 2019

Concept acquisition and improved in-database similarity analysis for medical data.
Distributed and Parallel Databases, 2019

Publishing inference-proof relational data: An implementation and experiments.
Data Knowl. Eng., 2019

UniAdapt: universal adaption of replication and indexes in distributed RDF triples stores.
Proceedings of the International Workshop on Semantic Big Data, 2019

Data Analytics with Graph Algorithms - A Hands-on Tutorial with Neo4J.
Proceedings of the Datenbanksysteme für Business, 2019

2018
Keeping Secrets by Separation of Duties While Minimizing the Amount of Cloud Servers.
T. Large-Scale Data- and Knowledge-Centered Systems, 2018

Efficient In-Database Patient Similarity Analysis for Personalized Medical Decision Support Systems.
Big Data Research, 2018

On the Hardness of Separation of Duties Problems for Cloud Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse.
Proceedings of the Sicherheit 2018, 2018

Construction and Visualization of Dynamic Biological Networks: Benchmarking the Neo4J Graph Database.
Proceedings of the Data Integration in the Life Sciences - 13th International Conference, 2018

Classifying Leukemia and Gout Patients with Neural Networks.
Proceedings of the Database and Expert Systems Applications, 2018

Space-Adaptive and Workload-Aware Replication and Partitioning for Distributed RDF Triple Stores.
Proceedings of the Database and Expert Systems Applications, 2018

Adaptive Workload-Based Partitioning and Replication for RDF Graphs.
Proceedings of the Database and Expert Systems Applications, 2018

CloudDBGuard: Enabling Sorting and Searching on Encrypted Data in NoSQL Cloud Databases.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2018

2017
A Replication Scheme for Multiple Fragmentations with Overlapping Fragments.
Comput. J., 2017

Improving Fuzzy Searchable Encryption with Direct Bigram Embedding.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Dynamic Similarity Search over Encrypted Data with Low Leakage.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Property Preserving Encryption in NoSQL Wide Column Stores.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

Separation of Duties for Multiple Relations in Cloud Databases as an Optimization Problem.
Proceedings of the 21st International Database Engineering & Applications Symposium, 2017

Implementing a Similarity Searchable Encryption Scheme for Cloud Database Usage.
Proceedings of the 29th GI-Workshop Grundlagen von Datenbanken, Blankenburg/Harz, 2017

Distributed Storage-Adaptable RDF Graph Store Over Cloud Infrastructure.
Proceedings of the 29th GI-Workshop Grundlagen von Datenbanken, Blankenburg/Harz, 2017

Flexible Query Answering with the powerset-AI Operator and Star-Based Ranking.
Proceedings of the Flexible Query Answering Systems - 12th International Conference, 2017

Comparative Evaluation for Recommender Systems for Book Recommendations.
Proceedings of the Datenbanksysteme für Business, 2017

BigBIA17 - Vorwort.
Proceedings of the Datenbanksysteme für Business, 2017

Closeness Constraints for Separation of Duties in Cloud Databases as an Optimization Problem.
Proceedings of the Data Analytics - 31st British International Conference on Databases, 2017

2016
Implementierung von kryptographischen Sicherheitsverfahren für Apache Cassandra und Apache HBase.
HMD - Praxis Wirtschaftsinform., 2016

Practical Application of Order-preserving Encryption in Wide Column Stores.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Ein Replikationsschema für multiple Fragmentierungen mit überlappenden Fragmenten.
Proceedings of the 28th GI-Workshop Grundlagen von Datenbanken, Nörten Hardenberg, 2016

2015
Polyglot Database Architectures = Polyglot Challenges.
Proceedings of the LWA 2015 Workshops: KDML, 2015

Ontologie-basierte Fragmentierungs- und Replikationsverfahren für verteilte Datenbanksysteme.
Proceedings of the 27th GI-Workshop Grundlagen von Datenbanken, Gommern, 2015

Searchable Encryption in Apache Cassandra.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Enhanced Processing of METS/MODS Library Metadata in CouchDB.
Proceedings of the 26th International Workshop on Database and Expert Systems Applications, 2015

Ontology-Driven Data Partitioning and Recovery for Flexible Query Answering.
Proceedings of the Database and Expert Systems Applications, 2015

Horizontal Fragmentation and Replication for Multiple Relaxation Attributes.
Proceedings of the Data Science - 30th British International Conference on Databases, 2015

Advanced Data Management for SQL, NoSQL, Cloud and Distributed Databases
DeGruyter, ISBN: 978-3-11-044141-3, 2015

2014
Clustering-based fragmentation and data replication for flexible query answering in distributed databases.
J. Cloud Computing, 2014

Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
Taxonomy-Based Fragmentation for Anti-instantiation in Distributed Databases.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Syntactic Similarity for Ranking Database Answers Obtained by Anti-Instantiation.
Proceedings of the KI 2013: Advances in Artificial Intelligence, 2013

Filtering of Unrelated Answers in a CooperativeQuery Answering System.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013

2012
Applications of Ordinal Ranks to Flexible Query Answering.
Proceedings of the Scalable Uncertainty Management - 6th International Conference, 2012

Implementing Inductive Concept Learning For Cooperative Query Answering.
Proceedings of the Data Analysis, Machine Learning and Knowledge Discovery, 2012

2011
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases.
Theor. Comput. Sci., 2011

On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints.
Proceedings of the Information Security, 14th International Conference, 2011

Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users.
Proceedings of the Applications of Declarative Programming and Knowledge Management, 2011

Generalizing Conjunctive Queries for Informative Answers.
Proceedings of the Flexible Query Answering Systems - 9th International Conference, 2011

2010
Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.
Proceedings of the Advances in Information and Computer Security, 2010

Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies.
Proceedings of the Computational Intelligence for Knowledge-Based Systems Design, 2010

Towards Controlled Query Evaluation for Incomplete First-Order Databases.
Proceedings of the Foundations of Information and Knowledge Systems, 2010

2009
Preprocessing for controlled query evaluation in complete first-order databases.
PhD thesis, 2009

Combining Consistency and Confidentiality Requirements in First-Order Databases.
Proceedings of the Information Security, 12th International Conference, 2009

Using SAT-Solvers to Compute Inference-Proof Database Instances.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
Preprocessing for controlled query evaluation with availability policy.
Journal of Computer Security, 2008

Change Propagation with the Change Notification Bus.
Proceedings of the Software Engineering 2008, 2008

2007
Inference Control in Logic Databases as a Constraint Satisfaction Problem.
Proceedings of the Information Systems Security, Third International Conference, 2007

Secure Mediation of Join Queries by Processing Ciphertexts.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
Proceedings of the Data and Applications Security XX, 2006

2005
Secure Mediation with Mobile Code.
Proceedings of the Data and Applications Security XIX, 2005


  Loading...