Sciweavers

3349 search results - page 21 / 670
» Data Security
Sort
View
CIKM
2005
Springer
15 years 3 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
GLOBECOM
2007
IEEE
15 years 4 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
FGCS
2007
172views more  FGCS 2007»
14 years 9 months ago
From access and integration to mining of secure genomic data sets across the Grid
The UK Department of Trade and Industry (DTI) funded BRIDGES project (Biomedical Research Informatics Delivered by Grid Enabled Services) has developed a Grid infrastructure to su...
Richard O. Sinnott
ACSAC
2000
IEEE
15 years 2 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
EUROCRYPT
2005
Springer
15 years 3 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...