Sciweavers

653 search results - page 75 / 131
» Database Privacy
Sort
View
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
16 years 4 months ago
Invalidation Clues for Database Scalability Services
For their scalability needs, data-intensive Web applications can use a Database Scalability Service (DBSS), which caches applications' query results and answers queries on th...
Amit Manjhi, Phillip B. Gibbons, Anastassia Ailama...
114
Voted
SP
1996
IEEE
15 years 7 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
202
Voted
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 7 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
SDMW
2004
Springer
15 years 8 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
151
Voted
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
15 years 8 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik