Sciweavers

1398 search results - page 68 / 280
» Medical Database Security
Sort
View
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
15 years 1 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
147
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 4 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
101
Voted
DBA
2004
88views Database» more  DBA 2004»
15 years 2 months ago
A Flexible Database Authorization System
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
Bazyli Blicharski, Krzysztof Stencel
92
Voted
DATASCIENCE
2002
69views more  DATASCIENCE 2002»
15 years 11 days ago
China's Natural Resources Database (CNRD)
China's Natural Resources Database (CNRD) is a comprehensive database, developed to support the research on natural resources, social sustainable development and environmenta...
Zehui Li
86
Voted
CCS
2005
ACM
15 years 6 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov