Sciweavers

1186 search results - page 54 / 238
» A New Approach to Secure Logging
Sort
View
107
Voted
DAWAK
2003
Springer
15 years 5 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
NDSS
2003
IEEE
15 years 5 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
105
Voted
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
15 years 7 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
DOLAP
2004
ACM
15 years 6 months ago
Cardinality-based inference control in OLAP systems: an information theoretic approach
We address the inference control problem in data cubes with some data known to users through external knowledge. The goal of inference controls is to prevent exact values of sensi...
Nan Zhang 0004, Wei Zhao, Jianer Chen
96
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
A Semantic Security Architecture for Web Services
—The shift from mere service-oriented architectures (SOA) to semantically enriched approaches is especially being forced in multi-domain environments that the public sector in th...
Stefan Durbeck, Christoph Fritsch, Günther Pe...