Sciweavers

4142 search results - page 215 / 829
» Trusting an Information Agent
Sort
View
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
16 years 5 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 4 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
NDSS
2009
IEEE
15 years 11 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
117
Voted
IIWAS
2007
15 years 5 months ago
Security aspects in Semantic Web Services Filtering
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact cru...
Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, ...
ATAL
2003
Springer
15 years 8 months ago
Using web helper agent profiles in query generation
Personalized information agents can help overcome some of the limitations of communal Web information sources such as portals and search engines. Two important components of these...
Gabriel Somlo, Adele E. Howe