Sciweavers

112 search results - page 9 / 23
» Secure and Portable Database Extensibility
Sort
View
DEXA
2005
Springer
110views Database» more  DEXA 2005»
14 years 18 days ago
Intensional Encapsulations of Database Subsets via Genetic Programming
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
Aybar C. Acar, Amihai Motro
CCS
2007
ACM
14 years 1 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
JNW
2008
103views more  JNW 2008»
13 years 7 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
SACMAT
2006
ACM
14 years 1 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan