Sciweavers

1398 search results - page 80 / 280
» Medical Database Security
Sort
View
SDMW
2004
Springer
14 years 2 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
CIKM
2006
Springer
14 years 24 days ago
k nearest neighbor classification across multiple private databases
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
Li Xiong, Subramanyam Chitti, Ling Liu
VLDB
1998
ACM
116views Database» more  VLDB 1998»
14 years 1 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ISI
2002
Springer
13 years 8 months ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
ISI
2003
Springer
14 years 2 months ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King