Sciweavers

1403 search results - page 94 / 281
» Security Model for XML Data
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
16 years 4 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
TRUSTBUS
2004
Springer
15 years 9 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
ESORICS
2009
Springer
16 years 5 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
SACMAT
2003
ACM
15 years 9 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf