Sciweavers

651 search results - page 47 / 131
» Negative Database for Data Security
Sort
View
ISCIS
2004
Springer
14 years 1 months ago
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such ...
Luís Almeida, Frederico Santos, Tullio Facc...
MSS
1999
IEEE
140views Hardware» more  MSS 1999»
14 years 2 days ago
Pursuit of a Scalable High Performance Multi-Petabyte Database
When the BaBar experiment at the Stanford Linear Accelerator Center starts in April 1999, it will generate approximately 200TB/year of data at a rate of 10MB/sec for 10 years. A m...
Andrew Hanushevsky, Marcia Nowark
ESORICS
2005
Springer
14 years 1 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 8 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
SOUPS
2005
ACM
14 years 1 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko