Sciweavers

320 search results - page 25 / 64
» Securing history: Privacy and accountability in database sys...
Sort
View
EUC
2007
Springer
14 years 1 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
TISSEC
2010
121views more  TISSEC 2010»
13 years 6 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
WISTP
2010
Springer
14 years 2 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
VLDB
2000
ACM
113views Database» more  VLDB 2000»
13 years 11 months ago
The Zero Latency Enterprise
Today's Internet economy has primed customers to expect immediate access and immediate results. But instant results are difficult to achieve when your customers want up-to-th...
Dave Liles
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...