Sciweavers

1398 search results - page 131 / 280
» Medical Database Security
Sort
View
WWW
2008
ACM
16 years 4 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
CCS
2007
ACM
15 years 10 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
15 years 4 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
CORR
2000
Springer
100views Education» more  CORR 2000»
15 years 3 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
DEXAW
1997
IEEE
76views Database» more  DEXAW 1997»
15 years 8 months ago
A Model for Intuitive Knowledge Sharing
This paper proposes a system which eases the job of entering and sharing expert analysis on a database system, with emphasis to pictorial and document information. With this syste...
Pedro Furtado, Henrique Madeira