Sciweavers

2386 search results - page 29 / 478
» Database Security 2000
Sort
View
WEBDB
2000
Springer
72views Database» more  WEBDB 2000»
15 years 6 months ago
Using Metadata to Enhance a Web Information Gathering System
Neel Sundaresan, Jeonghee Yi, Anita W. Huang
JCS
2000
148views more  JCS 2000»
15 years 2 months ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
ACSAC
2000
IEEE
15 years 6 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
15 years 6 months ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
75
Voted
AGENTS
2000
Springer
15 years 6 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...