Sciweavers

370 search results - page 45 / 74
» Providing Dynamic Security Control in a Federated Database
Sort
View
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 4 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
DBSEC
2006
115views Database» more  DBSEC 2006»
14 years 11 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
87
Voted
CCS
2007
ACM
15 years 3 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
97
Voted
VLDB
2001
ACM
108views Database» more  VLDB 2001»
15 years 2 months ago
Hyperqueries: Dynamic Distributed Query Processing on the Internet
In this paper we propose a new framework for dynamic distributed query processing based on so-called HyperQueries which are essentially query evaluation sub-plans “sitting behin...
Alfons Kemper, Christian Wiesner
EDBT
2006
ACM
177views Database» more  EDBT 2006»
15 years 9 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...