Sciweavers

2386 search results - page 95 / 478
» Database Security 2000
Sort
View
RAID
2010
Springer
14 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
WEBDB
2000
Springer
131views Database» more  WEBDB 2000»
15 years 1 months ago
Automatic Classification of Text Databases Through Query Probing
Many text databases on the web are "hidden" behind search interfaces, and their documents are only accessible through querying. Search engines typically ignore the conte...
Panagiotis G. Ipeirotis, Luis Gravano, Mehran Saha...
SDMW
2009
Springer
15 years 4 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre
ICALP
2005
Springer
15 years 3 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
CIS
2004
Springer
15 years 3 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi