Sciweavers

947 search results - page 65 / 190
» Information Security in Mobile Databases
Sort
View
154
Voted
DOA
2000
159views more  DOA 2000»
15 years 5 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
128
Voted
SEC
1996
15 years 5 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
110
Voted
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 9 months ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille
150
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
125
Voted
CJ
2004
105views more  CJ 2004»
15 years 3 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin