Sciweavers

291 search results - page 32 / 59
» Model driven development of secure XML databases
Sort
View
99
Voted
CIKM
2005
Springer
15 years 7 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
103
Voted
ITCC
2005
IEEE
15 years 7 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
105
Voted
IFIP
2001
Springer
15 years 6 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
HASE
2008
IEEE
15 years 8 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
SIGMOD
2003
ACM
115views Database» more  SIGMOD 2003»
16 years 1 months ago
Rondo: A Programming Platform for Generic Model Management
Model management aims at reducing the amount of programming needed for the development of metadata-intensive applications. We present a first complete prototype of a generic model...
Sergey Melnik, Erhard Rahm, Philip A. Bernstein