Sciweavers

120 search results - page 12 / 24
» Threats to privacy in the forensic analysis of database syst...
Sort
View
CRITIS
2009
13 years 8 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 9 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
DAMON
2006
Springer
13 years 11 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
COST
2009
Springer
121views Multimedia» more  COST 2009»
14 years 2 months ago
Vulnerability Assessment of Fingerprint Matching Based on Time Analysis
A time analysis of a reference minutiae-based fingerprint matching system is presented. We study the relation between the score generated by the system (NFIS2 from NIST) and the t...
Javier Galbally, Sara Carballo, Julian Fiér...