Sciweavers

13 search results - page 2 / 3
» dbsec 2010
Sort
View
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 6 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
DBSEC
2010
319views Database» more  DBSEC 2010»
13 years 6 months ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 6 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
DBSEC
2010
161views Database» more  DBSEC 2010»
13 years 6 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...