Sciweavers

14824 search results - page 2809 / 2965
» Security - Introduction
Sort
View
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
15 years 11 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 11 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
15 years 11 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
EDBT
2004
ACM
139views Database» more  EDBT 2004»
15 years 11 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery
EDBT
2006
ACM
177views Database» more  EDBT 2006»
15 years 11 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
« Prev « First page 2809 / 2965 Last » Next »