Sciweavers

2386 search results - page 144 / 478
» Database Security 2000
Sort
View
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
15 years 2 days ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
179
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 10 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SIGKDD
2002
172views more  SIGKDD 2002»
14 years 9 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
ESWA
2011
473views Database» more  ESWA 2011»
14 years 1 months ago
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Abstract: The security of a dynamic ID-based remote user authentication scheme for multiserver environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-...
Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang
VLDB
2007
ACM
155views Database» more  VLDB 2007»
15 years 10 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik