Sciweavers

1398 search results - page 80 / 280
» Medical Database Security
Sort
View
102
Voted
SDMW
2004
Springer
15 years 6 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
117
Voted
CIKM
2006
Springer
15 years 4 months ago
k nearest neighbor classification across multiple private databases
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
Li Xiong, Subramanyam Chitti, Ling Liu
VLDB
1998
ACM
116views Database» more  VLDB 1998»
15 years 4 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
124
Voted
ISI
2002
Springer
15 years 8 days ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
89
Voted
ISI
2003
Springer
15 years 5 months ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King