Sciweavers

2386 search results - page 152 / 478
» Database Security 2000
Sort
View
SIGMOD
2000
ACM
98views Database» more  SIGMOD 2000»
15 years 2 months ago
High Speed On-line Backup When Using Logical Log Operations
Media recovery protects a database from failures of the stable medium by maintaining an extra copy of the database, called the backup, and a media recovery log. When a failure occ...
David B. Lomet
101
Voted
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
15 years 10 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
ACSAC
2000
IEEE
15 years 2 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
DEXA
2003
Springer
134views Database» more  DEXA 2003»
15 years 3 months ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin