Sciweavers

947 search results - page 95 / 190
» Information Security in Mobile Databases
Sort
View
219
Voted
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
16 years 3 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...
126
Voted
MMS
2006
15 years 3 months ago
Update Relevance under the Multiset Semantics of RDBMS
: In order to reduce transmission costs and response time, mobile clients typically cache data locally. But, avoiding the usage of outdated data and maintaining the consistency of ...
Hagen Höpfner
139
Voted
VLC
2008
146views more  VLC 2008»
15 years 3 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
152
Voted
IDTRUST
2010
ACM
15 years 2 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
128
Voted
COMPSEC
2006
97views more  COMPSEC 2006»
15 years 3 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar