Sciweavers

2386 search results - page 4 / 478
» Database Security 2000
Sort
View
79
Voted
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 8 months ago
The emerging JPEG-2000 security (JPSEC) standard
John G. Apostolopoulos, Susie Wee, Fréd&eac...
ACISP
2001
Springer
15 years 6 months ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong
DMDW
2000
118views Management» more  DMDW 2000»
15 years 3 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
PODS
2000
ACM
221views Database» more  PODS 2000»
15 years 6 months ago
Fixed-Point Query Languages for Linear Constraint Databases
Ï ÒØÖÓ Ù Ñ ÐÝ Ó ÕÙ ÖÝ Ð Ò Ù × ÓÖ Ð Ò Ö ÓÒ¹ ×ØÖ ÒØ Ø × × ÓÚ Ö Ø Ö Ð׺ Ì Ð Ò Ù × Ö ¬Ò ÓÚ Ö ØÛÓ¹×ÓÖØ רÖÙ ØÙÖ ×...
Stephan Kreutzer
89
Voted
DEXAW
2000
IEEE
66views Database» more  DEXAW 2000»
15 years 6 months ago
Knowledge and Workflow Systems
Alfs T. Berztiss