Sciweavers

2386 search results - page 242 / 478
» Database Security 2000
Sort
View
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
15 years 4 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
DEXAW
1999
IEEE
102views Database» more  DEXAW 1999»
15 years 3 months ago
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories
This paper proposed a novel method to protect logging information more securely. The method, named NIGELOG, produces multiple backups of the logging information, hides them in arb...
Tetsuji Takada, Hideki Koike
DKE
2002
130views more  DKE 2002»
14 years 10 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
DASFAA
2008
IEEE
163views Database» more  DASFAA 2008»
15 years 5 months ago
Automated Data Discovery in Similarity Score Queries
A vast amount of information is being stored in scientific databases on the web. The dynamic nature of the scientific data, the cost of providing an up-to-date snapshot of the wh...
Fatih Altiparmak, Ali Saman Tosun, Hakan Ferhatosm...
CRYPTO
2008
Springer
75views Cryptology» more  CRYPTO 2008»
15 years 23 days ago
New Efficient Attacks on Statistical Disclosure Control Mechanisms
The goal of a statistical database is to provide statistics about a population while simultaneously protecting the privacy of the individual records in the database. The tension be...
Cynthia Dwork, Sergey Yekhanin