Sciweavers

726 search results - page 38 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
EL
2011
86views more  EL 2011»
12 years 7 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 1 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 7 months ago
Providing Data Group Anonymity Using Concentration Differences
Public access to digital data can turn out to be a cause of undesirable information disclosure. That's why it is vital to somehow protect the data before publishing. There are...
Oleg Chertov, Dan Tavrov
SACMAT
2010
ACM
13 years 6 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 11 days ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden