Sciweavers

265 search results - page 47 / 53
» A role-based approach to access control for XML databases
Sort
View
HASE
2008
IEEE
14 years 1 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
WPES
2005
ACM
14 years 28 days ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 7 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 9 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi