Sciweavers

947 search results - page 25 / 190
» Information Security in Mobile Databases
Sort
View
138
Voted
DEXA
2004
Springer
83views Database» more  DEXA 2004»
15 years 7 months ago
Processing Ad-Hoc Joins on Mobile Devices
Abstract. Mobile devices are capable of retrieving and processing data from remote databases. In a wireless data transmission environment, users are typically charged by the size o...
Eric Lo, Nikos Mamoulis, David Wai-Lok Cheung, Wai...
PET
2010
Springer
15 years 7 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
182
Voted
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 4 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
119
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 7 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
124
Voted
CGI
2003
IEEE
15 years 7 months ago
Consistent Visualization and Querying of GIS Databases by a Location-Aware Mobile Agent
Location-aware mobile users need to access, query, and visualize, geographic information in a wide variety of applications including tourism, navigation, environmental management,...
Suresh K. Lodha, Nikolai M. Faaland, Grant Wong, A...