Sciweavers

2386 search results - page 232 / 478
» Database Security 2000
Sort
View
80
Voted
SWS
2004
ACM
15 years 4 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
91
Voted
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 4 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
93
Voted
DEXAW
2007
IEEE
113views Database» more  DEXAW 2007»
15 years 2 months ago
A new domain-based payment model for emerging mobile commerce scenarios
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Diego Suarez, Joaquín Torres Márquez...
107
Voted
ACSAC
2007
IEEE
15 years 5 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
MSR
2009
ACM
15 years 3 months ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk