Sciweavers

859 search results - page 115 / 172
» Security for Key Management Interfaces
Sort
View
RAID
2010
Springer
13 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 8 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
IUI
2000
ACM
14 years 2 months ago
Context-aware office assistant
This paper describes the design and implementation of the Office Assistant – an agent that interacts with visitors at the office door and manages the office owner’s schedule. ...
Hao Yan, Ted Selker
IUSED
2008
13 years 11 months ago
Fostering Remote User Participation and Integration of User Feedback into Software Development
Permanent involvement of end users in software development is both highly recommended and highly challenging. Against the background of our results and experiences from two resear...
Steffen Lohmann, Asarnusch Rashid
TRIDENTCOM
2010
IEEE
13 years 7 months ago
Berlin: The Berlin Experimental Router Laboratory for Innovative Networking
Today's disruptive approaches to rearchitecting the Internet, e.g., Clean Slate Networking initiatives require testbeds that present unprecedented flexibility to the experimen...
Dan Levin, Andreas Wundsam, Amir Mehmood, Anja Fel...