Sciweavers

2492 search results - page 106 / 499
» Ontology-based Database Access
Sort
View
97
Voted
ADT
2006
15 years 23 days ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
WOSP
2010
ACM
15 years 7 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
WCRE
2009
IEEE
15 years 7 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
102
Voted
SACMAT
2005
ACM
15 years 6 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
140
Voted
CCS
2008
ACM
15 years 1 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar