Sciweavers

325 search results - page 26 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
CIKM
2005
Springer
14 years 1 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
SDM
2007
SIAM
106views Data Mining» more  SDM 2007»
13 years 9 months ago
Approximating Representations for Large Numerical Databases
The paper introduces a notion of support for realvalued functions. It is shown how to approximate supports of a large class of functions based on supports of so called polynomial ...
Szymon Jaroszewicz, Marcin Korzen
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
DPD
1998
141views more  DPD 1998»
13 years 7 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...