Sciweavers

92 search results - page 12 / 19
» Secure XML Querying with Security Views
Sort
View
TES
2001
Springer
14 years 1 days ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
DBSEC
2000
102views Database» more  DBSEC 2000»
13 years 9 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
SDMW
2004
Springer
14 years 29 days ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
OOPSLA
1997
Springer
13 years 11 months ago
Query-Based Debugging of Object-Oriented Programs
Object relationships in modern software systems are becoming increasingly numerous and complex. Programmers who try to find violations of such relationships need new tools that al...
Raimondas Lencevicius, Urs Hölzle, Ambuj K. S...
SOFSEM
2005
Springer
14 years 1 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta