Sciweavers

2386 search results - page 92 / 478
» Database Security 2000
Sort
View
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
15 years 10 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
CIA
1997
Springer
15 years 1 months ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner
TWC
2008
170views more  TWC 2008»
14 years 9 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
WPES
2003
ACM
15 years 3 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
ADBIS
2000
Springer
135views Database» more  ADBIS 2000»
15 years 2 months ago
Database Research Activities in Russia: a Brief Overview
The paper provides brief analysis of recent research activities in database area in Russia. Activities of the Moscow ACM SIGMOD Chapter are characterized, emphasizing organization ...
Leonid A. Kalinichenko, Mikhail R. Kogalovsky, Ser...