Sciweavers

947 search results - page 120 / 190
» Information Security in Mobile Databases
Sort
View
132
Voted
SWS
2004
ACM
15 years 9 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
115
Voted
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Inquiring of the Sights from the Web via Camera Mobiles
In this paper, we presented an image search service for mobile users. It can be used to acquire related information by taking and sending pictures to the server, for example, gett...
Yinghua Zhou, Xin Fan, Xing Xie, Yuchang Gong, Wei...
CSREASAM
2006
15 years 4 months ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
142
Voted
ACSAC
2007
IEEE
15 years 9 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
104
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 8 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...