In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...