Sciweavers

651 search results - page 24 / 131
» Negative Database for Data Security
Sort
View
DASFAA
2006
IEEE
156views Database» more  DASFAA 2006»
14 years 1 months ago
TwigStackList-: A Holistic Twig Join Algorithm for Twig Query with Not-Predicates on XML Data
As business and enterprises generate and exchange XML data more often, there is an increasing need for searching and querying XML data. A lot of researches have been done to match ...
Tian Yu, Tok Wang Ling, Jiaheng Lu
SDMW
2009
Springer
14 years 2 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 8 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
PET
2010
Springer
13 years 11 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
CSE
2009
IEEE
14 years 2 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...