Sciweavers

3349 search results - page 164 / 670
» Data Security
Sort
View
131
Voted
EDBTW
2006
Springer
15 years 5 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
226
Voted
GCC
2004
Springer
15 years 9 months ago
Applying Grid Technologies to Distributed Data Mining
The Grid promises improvements in the effectiveness with which global businesses are managed, if it enables distributed expertise to be efficiently applied to the analysis of dist...
Alastair C. Hume, Ashley D. Lloyd, Terence M. Sloa...
122
Voted
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 9 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
139
Voted
ACMSE
2006
ACM
15 years 5 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
133
Voted
CSREASAM
2006
15 years 5 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang