Sciweavers

2386 search results - page 120 / 478
» Database Security 2000
Sort
View
NAR
2000
101views more  NAR 2000»
14 years 9 months ago
FIMM, a database of functional molecular immunology
FIMM database (http://sdmc.krdl.org.sg:8080/fimm ) contains data relevant to functional molecular immunology, focusing on cellular immunology. It contains fully referenced data on...
Christian Schönbach, Judice L. Y. Koh, Xin Sh...
TKDE
2008
123views more  TKDE 2008»
14 years 10 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...
CCS
2010
ACM
15 years 2 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
ICMCS
2000
IEEE
110views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Multi-clip Query Optimization in Video Databases
A multi-clip query requests multiple video clips. In this paper we address the multi-clip query optimization problem. We propose a new heuristics called Restricted Search Interval...
Ahmed Mostefaoui, Lionel Brunie, Harald Kosch, L&a...
CIKM
2004
Springer
15 years 3 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu