Sciweavers

1398 search results - page 204 / 280
» Medical Database Security
Sort
View
IJCIS
1998
107views more  IJCIS 1998»
15 years 8 days ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
JCS
2002
115views more  JCS 2002»
15 years 8 days ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 1 months ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei
99
Voted
PAAMS
2010
Springer
14 years 10 months ago
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injectio...
Álvaro Herrero, Cristian Pinzón, Emi...
134
Voted
ICMCS
2009
IEEE
189views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Efficient human action recognition by luminance field trajectory and geometry information
In recent years the video event understanding is an active research topic, with many applications in surveillance, security, and multimedia search and mining. In this paper we foc...
Haomian Zheng, Zhu Li, Yun Fu