Sciweavers

2386 search results - page 186 / 478
» Database Security 2000
Sort
View
DBSEC
1996
125views Database» more  DBSEC 1996»
14 years 12 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 5 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 5 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 4 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
SDMW
2004
Springer
15 years 3 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan