Sciweavers

2386 search results - page 29 / 478
» Database Security 2000
Sort
View
WEBDB
2000
Springer
72views Database» more  WEBDB 2000»
15 years 1 months ago
Using Metadata to Enhance a Web Information Gathering System
Neel Sundaresan, Jeonghee Yi, Anita W. Huang
JCS
2000
148views more  JCS 2000»
14 years 9 months ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
ACSAC
2000
IEEE
15 years 2 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
76
Voted
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
15 years 2 months ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
AGENTS
2000
Springer
15 years 2 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...