Sciweavers

889 search results - page 20 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
64
Voted
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 3 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 2 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
EDBT
2008
ACM
128views Database» more  EDBT 2008»
15 years 9 months ago
Processing transitive nearest-neighbor queries in multi-channel access environments
Wireless broadcast is an efficient way for information dissemination due to its good scalability [10]. Existing works typically assume mobile devices, such as cell phones and PDAs...
Xiao Zhang, Wang-Chien Lee, Prasenjit Mitra, Baihu...
DBSEC
2007
89views Database» more  DBSEC 2007»
14 years 11 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
14 years 12 days ago
ProApproX: a lightweight approximation query processor over probabilistic trees
We demonstrate a system for querying probabilistic XML documents with simple XPath queries. A user chooses between a variety of query answering techniques, both exact and approxim...
Pierre Senellart, Asma Souihli