Sciweavers

2386 search results - page 69 / 478
» Database Security 2000
Sort
View
51
Voted
JCSC
2000
58views more  JCSC 2000»
14 years 9 months ago
TDMA Secure Communication Scheme Based on Synchronization of Chua's Circuits
Zhenya He, Ke Li, Luxi Yang, Yuhui Shi
ICPPW
2003
IEEE
15 years 3 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
TKDE
2008
122views more  TKDE 2008»
14 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu