Sciweavers

2386 search results - page 102 / 478
» Database Security 2000
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
SP
2000
IEEE
15 years 2 months ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
15 years 10 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
COMCOM
2000
105views more  COMCOM 2000»
14 years 9 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
ICDE
2000
IEEE
95views Database» more  ICDE 2000»
15 years 2 months ago
The IDEAL Approach to Internet-Based Negotiation for E-Business
Joachim Hammer, Chunbo Huang, Yihua Huang, Charnyo...