Sciweavers

2386 search results - page 87 / 478
» Database Security 2000
Sort
View
COMCOM
2000
143views more  COMCOM 2000»
14 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
SDMW
2009
Springer
15 years 4 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
TRUSTBUS
2004
Springer
15 years 3 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
PET
2010
Springer
15 years 1 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer