Sciweavers

8 search results - page 2 / 2
» Implementation of a Storage Mechanism for Untrusted DBMSs
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
13 years 11 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
WIDM
2003
ACM
13 years 10 months ago
XVerter: querying XML data with OR-DBMS
Storage techniques and queries over XML databases are being widely studied. Most works store XML documents in traditional DBMSs in order to take advantage of a well established te...
Humberto Vieira, Gabriela Ruberg, Marta Mattoso
MOBISYS
2007
ACM
14 years 4 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi