Sciweavers

2386 search results - page 121 / 478
» Database Security 2000
Sort
View
ISI
2008
Springer
14 years 8 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
ADBIS
2000
Springer
119views Database» more  ADBIS 2000»
15 years 2 months ago
A Benchmarking Technique for DBMS's with Advanced Data Models
The majority of database benchmarks currently in use in the industry were designed for relational databases. A different class of benchmarks became required for object oriented dat...
Naphtali Rishe, Alexander Vaschillo, Dmitry Vasile...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
15 years 10 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
EUC
2007
Springer
15 years 4 months ago
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
SACMAT
2006
ACM
15 years 3 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas