Sciweavers

651 search results - page 30 / 131
» Negative Database for Data Security
Sort
View
POPL
2006
ACM
14 years 8 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
PODS
2010
ACM
223views Database» more  PODS 2010»
13 years 9 months ago
Characterizing schema mappings via data examples
Schema mappings are high-level specifications that describe the relationship between two database schemas; they are considered to be the essential building blocks in data exchange...
Bogdan Alexe, Phokion G. Kolaitis, Wang Chiew Tan
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
14 years 1 months ago
The CenSSIS Image Database
The CenSSIS Image Database System is a scientific database that enables effective data management and collaboration to accelerate fundamental research. This paper describes the d...
Huanmei Wu, Becky Norum, Judith Newmark, Betty Sal...
CCS
2010
ACM
14 years 2 days ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
BNCOD
2009
125views Database» more  BNCOD 2009»
13 years 5 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...