Sciweavers

2386 search results - page 113 / 478
» Database Security 2000
Sort
View
ISI
2002
Springer
14 years 9 months ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
ISI
2003
Springer
15 years 3 months ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King
ACMSE
2006
ACM
15 years 4 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
ACSAC
2000
IEEE
15 years 2 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie