Sciweavers

20059 search results - page 3892 / 4012
» The Satellite Data Model
Sort
View
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
16 years 1 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
SIGMOD
2004
ACM
142views Database» more  SIGMOD 2004»
16 years 1 months ago
Understanding Web Query Interfaces: Best-Effort Parsing with Hidden Syntax
Recently, the Web has been rapidly "deepened" by many searchable databases online, where data are hidden behind query forms. For modelling and integrating Web databases,...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
PODS
2002
ACM
168views Database» more  PODS 2002»
16 years 1 months ago
Conjunctive Selection Conditions in Main Memory
We consider the fundamental operation of applying a conjunction of selection conditions to a set of records. With large main memories available cheaply, systems may choose to keep...
Kenneth A. Ross
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 1 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
PERCOM
2005
ACM
16 years 25 days ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
« Prev « First page 3892 / 4012 Last » Next »