Sciweavers

1457 search results - page 78 / 292
» Privacy Challenges for Database Systems
Sort
View
116
Voted
CRITIS
2007
15 years 5 months ago
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensu...
Alberto Stefanini, Gerard Doorman, Nouredine Hadjs...
131
Voted
ICDE
2010
IEEE
228views Database» more  ICDE 2010»
16 years 3 months ago
Strongly consistent replication for a bargain
Strong consistency is an important correctness property for replicated databases. It ensures that each transaction accesses the latest committed database state as provided in centr...
Konstantinos Krikellas, Sameh Elnikety, Zografoula...
ICDE
2008
IEEE
127views Database» more  ICDE 2008»
16 years 4 months ago
Optimizing SQL Queries over Text Databases
Text documents often embed data that is structured in nature, and we can expose this structured data using information extraction technology. By processing a text database with inf...
Alpa Jain, AnHai Doan, Luis Gravano
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 6 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
105
Voted
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
15 years 9 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt