Sciweavers

651 search results - page 39 / 131
» Negative Database for Data Security
Sort
View
SDMW
2004
Springer
14 years 1 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
14 years 2 months ago
A Static Analysis Framework for Database Applications
—Database developers today use data access APIs such as ADO.NET to execute SQL queries from their application. These applications often have security problems such as SQL injecti...
Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala
CIKM
2008
Springer
13 years 9 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
ACSAC
2005
IEEE
14 years 1 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
VLDB
1998
ACM
116views Database» more  VLDB 1998»
13 years 12 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula