Sciweavers

2386 search results - page 96 / 478
» Database Security 2000
Sort
View
ESORICS
1994
Springer
15 years 1 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 4 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
STORAGESS
2005
ACM
15 years 3 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
FQAS
2000
Springer
88views Database» more  FQAS 2000»
15 years 1 months ago
Intelligent Methods in Virtual Databases
Considerable progress has been achieved in the area of virtual database systems, but substantial problems still persist. In this paper we discuss two current research directions: ...
Amihai Motro, Philipp Anokhin, Jacob Berlin
ISI
2003
Springer
15 years 3 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia