Sciweavers

2386 search results - page 223 / 478
» Database Security 2000
Sort
View
80
Voted
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 10 days ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
75
Voted
ITCC
2002
IEEE
15 years 3 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
103
Voted
ACSAC
2000
IEEE
15 years 3 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
87
Voted
ACSAC
2000
IEEE
15 years 3 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
CSFW
2000
IEEE
15 years 2 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider