Sciweavers

947 search results - page 70 / 190
» Information Security in Mobile Databases
Sort
View
127
Voted
IWIA
2005
IEEE
15 years 9 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
103
Voted
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
16 years 3 months ago
Closing the key loophole in MLS databases
: There has been an abundance of research within the last couple of decades in the area of multilevel secure (MLS) databases. Recent work in this field deals with the processing of...
Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
133
Voted
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 10 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
119
Voted
DEXA
2005
Springer
110views Database» more  DEXA 2005»
15 years 9 months ago
Intensional Encapsulations of Database Subsets via Genetic Programming
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
Aybar C. Acar, Amihai Motro
131
Voted
SCANGIS
2001
15 years 5 months ago
Location-based services: A database perspective
We are heading rapidly towards a global computing and information infrastructure that will contain billions of wirelessly connected devices, many of which will offer so-called loca...
Christian S. Jensen, Anders Friis-Christensen, Tor...