Sciweavers

2386 search results - page 266 / 478
» Database Security 2000
Sort
View
POLICY
2001
Springer
15 years 7 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
CCS
2006
ACM
15 years 7 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 4 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
ICIP
2000
IEEE
16 years 4 months ago
Hierarchical Histograms - A New Representation Scheme for Image-Based Data Retrieval
This paper proposes a new image representation scheme for database indexing. The application domain is \image-based" indexing as opposed to \content-based" indexing. In ...
Senthil Kumar, Guna Seetharaman
ICPR
2000
IEEE
16 years 4 months ago
A Weighted Distance Approach to Relevance Feedback
Content-based image retrievalsystems use low-levelfeatures like color and texturefor image representation. Given these representationsasfeature vectors, similarity between images ...
Selim Aksoy, Robert M. Haralick, Faouzi Alaya Chei...