Sciweavers

1394 search results - page 261 / 279
» Executing Nested Queries
Sort
View
CCS
2008
ACM
15 years 3 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 3 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
DAWAK
2010
Springer
15 years 2 months ago
Physical Design and Implementation of Spatial Data Warehouses Supporting Continuous Fields
Abstract. Although many proposals exist for extending Geographic Information Systems (GIS) with OLAP and data warehousing capabilities (a topic denoted SOLAP), only recently the im...
Leticia I. Gómez, Alejandro A. Vaisman, Est...
110
Voted
CACM
2008
96views more  CACM 2008»
15 years 2 months ago
The provenance of electronic data
In the study of fine art, provenance refers to the documented history of some art object. Given that documented history, the object attains an authority that allows scholars to ap...
Luc Moreau, Paul T. Groth, Simon Miles, Javier V&a...
DEBU
2010
170views more  DEBU 2010»
15 years 2 months ago
Roads Belong in Databases
The popularity of location-based services and the need to perform real-time processing on them has led to an interest in queries on road networks, such as finding shortest paths a...
Jagan Sankaranarayanan, Hanan Samet