Sciweavers

2386 search results - page 281 / 478
» Database Security 2000
Sort
View
NAR
2011
176views Computer Vision» more  NAR 2011»
14 years 6 months ago
IUPHAR-DB: new receptors and tools for easy searching and visualization of pharmacological data
The IUPHAR database is an established online reference resource for several important classes of human drug targets and related proteins. As well as providing recommended nomencla...
Joanna L. Sharman, Chidochangu P. Mpamhanga, Micha...
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 10 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
CCS
2005
ACM
15 years 8 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CCS
2006
ACM
15 years 7 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
WWW
2008
ACM
16 years 4 months ago
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid - a framework for supporting anonymous location-based queries in mobile information delivery systems. The PrivacyGrid framework offers three unique...
Bhuvan Bamba, Ling Liu, Péter Pesti, Ting W...