Sciweavers

2386 search results - page 212 / 478
» Database Security 2000
Sort
View
FQAS
2000
Springer
80views Database» more  FQAS 2000»
15 years 2 months ago
A Knowledge Scout for Discovering Medical Patterns: Methodology and System SCAMP
Knowledge scouts are software agents that autonomously synthesize knowledge of interest to a given user (target knowledge) by applying inductive database operators to a local or di...
Kenneth A. Kaufman, Ryszard S. Michalski
ISMIS
2000
Springer
15 years 2 months ago
Extended Query Answering Using Integrity Rules
Abstract. The conventional use of databases is commonly restricted to the retrieval of factual data in the form of tuples or records. However most databases also contain metadata i...
Barry G. T. Lowden, Jerome Robinson
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
15 years 11 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
163
Voted
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
15 years 11 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...
ESORICS
2007
Springer
15 years 2 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu