Sciweavers

1323 search results - page 64 / 265
» Updatable Security Views
Sort
View
WWW
2011
ACM
13 years 5 months ago
Rewriting queries on SPARQL views
The problem of answering SPARQL queries over virtual SPARQL views is commonly encountered in a number of settings, including while enforcing security policies to access RDF data, ...
Wangchao Le, Songyun Duan, Anastasios Kementsietsi...
PDIS
1996
IEEE
14 years 2 months ago
The Strobe Algorithms for Multi-Source Warehouse Consistency
A warehouse is a data repository containing integrated information for e cient querying and analysis. Maintaining the consistency of warehouse data is challenging, especially if t...
Yue Zhuge, Hector Garcia-Molina, Janet L. Wiener
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
14 years 3 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
ACSAC
2001
IEEE
14 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
VIZSEC
2005
Springer
14 years 3 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...