Sciweavers

2386 search results - page 4 / 478
» Database Security 2000
Sort
View
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 3 months ago
The emerging JPEG-2000 security (JPSEC) standard
John G. Apostolopoulos, Susie Wee, Fréd&eac...
ACISP
2001
Springer
15 years 2 months ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong
DMDW
2000
118views Management» more  DMDW 2000»
14 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
PODS
2000
ACM
221views Database» more  PODS 2000»
15 years 1 months ago
Fixed-Point Query Languages for Linear Constraint Databases
Ï ÒØÖÓ Ù Ñ ÐÝ Ó ÕÙ ÖÝ Ð Ò Ù × ÓÖ Ð Ò Ö ÓÒ¹ ×ØÖ ÒØ Ø × × ÓÚ Ö Ø Ö Ð׺ Ì Ð Ò Ù × Ö ¬Ò ÓÚ Ö ØÛÓ¹×ÓÖØ רÖÙ ØÙÖ ×...
Stephan Kreutzer
DEXAW
2000
IEEE
66views Database» more  DEXAW 2000»
15 years 2 months ago
Knowledge and Workflow Systems
Alfs T. Berztiss