Sciweavers

889 search results - page 30 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
ESORICS
1994
Springer
15 years 1 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
SIGMOD
2008
ACM
188views Database» more  SIGMOD 2008»
15 years 9 months ago
HERMES: aggregative LBS via a trajectory DB engine
We present HERMES, a prototype system based on a powerful query language for trajectory databases, which enables the support of aggregative Location-Based Services (LBS). The key ...
Nikos Pelekis, Elias Frentzos, Nikos Giatrakos, Ya...
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
15 years 9 months ago
Closing the key loophole in MLS databases
: There has been an abundance of research within the last couple of decades in the area of multilevel secure (MLS) databases. Recent work in this field deals with the processing of...
Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
DOOD
1995
Springer
128views Database» more  DOOD 1995»
15 years 1 months ago
Authorization Analysis of Queries in Object-Oriented Databases
Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorization...
Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel