Sciweavers

3349 search results - page 11 / 670
» Data Security
Sort
View
WETICE
2006
IEEE
15 years 3 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
15 years 1 months ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
97
Voted
ICETE
2004
129views Business» more  ICETE 2004»
14 years 11 months ago
Data Mining Techniques for Security of Web Services
Manu Malek, Fotios C. Harmantzis
SPW
2004
Springer
15 years 3 months ago
A Cryptographic Framework for the Controlled Release of Certified Data
Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
DBSEC
2003
140views Database» more  DBSEC 2003»
14 years 11 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica