Sciweavers

651 search results - page 31 / 131
» Negative Database for Data Security
Sort
View
PODS
2005
ACM
109views Database» more  PODS 2005»
14 years 8 months ago
XPath satisfiability in the presence of DTDs
We study the satisfiability problem associated with XPath in the presence of DTDs. This is the problem of determining, given a query p in an XPath fragment and a DTD D, whether or...
Michael Benedikt, Wenfei Fan, Floris Geerts
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
14 years 2 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
11 years 10 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
ICASSP
2008
IEEE
14 years 2 months ago
Dynamic signature verification with template protection using helper data
A biometric template protection system for dynamic signature veri cation is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but...
Manuel R. Freire, Julian Fiérrez, Javier Or...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...