Sciweavers

14 search results - page 2 / 3
» dbsec 2006
Sort
View
DBSEC
2006
160views Database» more  DBSEC 2006»
13 years 6 months ago
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Abstract. Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling t...
Joachim Biskup, Lena Wiese
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 6 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 6 months ago
A Framework for Flexible Access Control in Digital Library Systems
Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not complete...
Indrajit Ray, Sudip Chakraborty
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 6 months ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 6 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera