Sciweavers

1457 search results - page 153 / 292
» Privacy Challenges for Database Systems
Sort
View
NOMS
2006
IEEE
15 years 10 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
XMLSEC
2003
ACM
15 years 9 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
SP
2002
IEEE
15 years 3 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
SDMW
2010
Springer
15 years 1 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
110
Voted
SIGMOD
2010
ACM
312views Database» more  SIGMOD 2010»
15 years 8 months ago
TwitterMonitor: trend detection over the twitter stream
We present TwitterMonitor, a system that performs trend detection over the Twitter stream. The system identifies emerging topics (i.e. ‘trends’) on Twitter in real time and p...
Michael Mathioudakis, Nick Koudas