Sciweavers

3349 search results - page 37 / 670
» Data Security
Sort
View
STORAGESS
2006
ACM
15 years 3 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
15 years 2 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
66
Voted
CSREASAM
2006
14 years 11 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
ESORICS
2012
Springer
13 years 5 days ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
ACSAC
2001
IEEE
15 years 1 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...