Sciweavers

651 search results - page 46 / 131
» Negative Database for Data Security
Sort
View
BTW
2005
Springer
177views Database» more  BTW 2005»
14 years 1 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
CSREASAM
2009
13 years 9 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
ER
1998
Springer
147views Database» more  ER 1998»
14 years 1 days ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
VLDB
2005
ACM
151views Database» more  VLDB 2005»
14 years 1 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 7 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier