Sciweavers

30 search results - page 6 / 6
» Transforming policies into mechanisms with infokernel
Sort
View
CCS
2005
ACM
13 years 11 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 5 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
13 years 10 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
CSFW
2009
IEEE
14 years 4 days ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
ESOP
2003
Springer
13 years 10 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen