Sciweavers

2386 search results - page 222 / 478
» Database Security 2000
Sort
View
98
Voted
SAC
2000
ACM
15 years 2 months ago
Efficient and Flexible Web Access to Art-Historical Image Collections
Modern object-relational database systems are capable of managing multimedia data, e.g. image, video and audio. In this paper we study how such universal database systems can be u...
Matthias Wagner, Stefan Holland, Werner Kieß...
ACISP
2001
Springer
15 years 3 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
105
Voted
ISF
2008
114views more  ISF 2008»
14 years 11 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
182
Voted
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
15 years 11 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
ACSAC
2006
IEEE
15 years 5 months ago
Enhancing Collaborative Spam Detection with Bloom Filters
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...
Jeff Yan, Pook Leong Cho