Sciweavers

4 search results - page 1 / 1
» Database Isolation and Filtering against Data Corruption Att...
Sort
View
ACSAC
2007
IEEE
13 years 11 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
JNCA
2006
86views more  JNCA 2006»
13 years 4 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
FC
2005
Springer
87views Cryptology» more  FC 2005»
13 years 10 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
BMCBI
2007
173views more  BMCBI 2007»
13 years 4 months ago
CGKB: an annotation knowledge base for cowpea (Vigna unguiculata L.) methylation filtered genomic genespace sequences
Background: Cowpea [Vigna unguiculata (L.) Walp.] is one of the most important food and forage legumes in the semiarid tropics because of its ability to tolerate drought and grow ...
Xianfeng Chen, Thomas W. Laudeman, Paul J. Rushton...