Sciweavers

1403 search results - page 105 / 281
» Security Model for XML Data
Sort
View
PODS
2010
ACM
181views Database» more  PODS 2010»
15 years 9 months ago
Schema design for XML repositories: complexity and tractability
Abiteboul et al. initiated the systematic study of distributed XML documents consisting of several logical parts, possibly located on different machines. The physical distributio...
Wim Martens, Matthias Niewerth, Thomas Schwentick
ESORICS
2010
Springer
15 years 4 months ago
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applicat...
Octavian Catrina, Sebastiaan de Hoogh
ICDAR
2003
IEEE
15 years 9 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 8 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
DRM
2007
Springer
15 years 10 months ago
Data structures for limited oblivious execution of programs while preserving locality of reference
We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one tr...
Avinash V. Varadarajan, Ramarathnam Venkatesan, C....