Sciweavers

2386 search results - page 34 / 478
» Database Security 2000
Sort
View
85
Voted
DBSEC
2000
110views Database» more  DBSEC 2000»
14 years 11 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
PODS
2000
ACM
112views Database» more  PODS 2000»
15 years 2 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
81
Voted
EUROCRYPT
2000
Springer
15 years 1 months ago
On the Security of 3GPP Networks
Michael Walker
86
Voted
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
15 years 9 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer