Sciweavers

2386 search results - page 83 / 478
» Database Security 2000
Sort
View
CCS
2000
ACM
15 years 1 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
JNCA
2006
86views more  JNCA 2006»
14 years 9 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
15 years 4 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
SACMAT
2004
ACM
15 years 3 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
ICFP
2000
ACM
15 years 2 months ago
Static enforcement of security with types
A number of security systems for programming languages have recently appeared, including systems for enforcing some form of ac
Christian Skalka, Scott F. Smith