Sciweavers

3349 search results - page 11 / 670
» Data Security
Sort
View
WETICE
2006
IEEE
14 years 4 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
14 years 2 months ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
ICETE
2004
129views Business» more  ICETE 2004»
14 years 9 days ago
Data Mining Techniques for Security of Web Services
Manu Malek, Fotios C. Harmantzis
SPW
2004
Springer
14 years 4 months ago
A Cryptographic Framework for the Controlled Release of Certified Data
Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
DBSEC
2003
140views Database» more  DBSEC 2003»
14 years 8 days ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica