Sciweavers

1398 search results - page 170 / 280
» Medical Database Security
Sort
View
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
15 years 1 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 5 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
16 years 4 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
ADC
2007
Springer
107views Database» more  ADC 2007»
15 years 10 months ago
A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents usin...
Tao-Ku Chang, Gwan-Hwan Hwang
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 10 months ago
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...