Sciweavers

1398 search results - page 111 / 280
» Medical Database Security
Sort
View
COOPIS
2004
IEEE
14 years 1 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
ELPUB
2003
ACM
14 years 3 months ago
Building a Federated, Online Social Sciences and Humanities Database of Journals and Research Communication: A Canadian Initiati
: Synergies is an emerging online Canadian publishing project in the social sciences and humanities that builds on a group of online publishing initiatives that have emerged over t...
Rowland Lorimer, Richard Smith
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 1 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ADC
2008
Springer
114views Database» more  ADC 2008»
14 years 6 days ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo