Sciweavers

651 search results - page 5 / 131
» Negative Database for Data Security
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
SIGMOD
2004
ACM
241views Database» more  SIGMOD 2004»
14 years 7 months ago
SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases
This paper introduces the Scalable INcremental hash-based Algorithm (SINA, for short); a new algorithm for evaluating a set of concurrent continuous spatio-temporal queries. SINA ...
Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
14 years 8 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton
ACSAC
2001
IEEE
13 years 11 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu