Sciweavers

1398 search results - page 68 / 280
» Medical Database Security
Sort
View
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 10 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 22 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
DBA
2004
88views Database» more  DBA 2004»
13 years 10 months ago
A Flexible Database Authorization System
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
Bazyli Blicharski, Krzysztof Stencel
DATASCIENCE
2002
69views more  DATASCIENCE 2002»
13 years 8 months ago
China's Natural Resources Database (CNRD)
China's Natural Resources Database (CNRD) is a comprehensive database, developed to support the research on natural resources, social sustainable development and environmenta...
Zehui Li
CCS
2005
ACM
14 years 2 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov