Sciweavers

2386 search results - page 82 / 478
» Database Security 2000
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 11 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
NAR
2000
118views more  NAR 2000»
14 years 9 months ago
DIP: the Database of Interacting Proteins
The Database of Interacting Proteins (DIP; http:// dip.doe-mbi.ucla.edu) is a database that documents experimentally determined protein
Ioannis Xenarios, Danny W. Rice, Lukasz Salw&iacut...
INFOSCALE
2007
ACM
14 years 11 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
AGENTS
2000
Springer
15 years 2 months ago
SIAS: a secure shopping information agent system
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...
AGENTS
2000
Springer
15 years 2 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...