Sciweavers

411 search results - page 50 / 83
» User Authentication in Multidatabase Systems
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 10 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
GRID
2006
Springer
13 years 8 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
WWW
2005
ACM
14 years 9 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
SIGSOFT
2004
ACM
14 years 9 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
AVBPA
2003
Springer
184views Biometrics» more  AVBPA 2003»
14 years 2 months ago
Biometric Template Selection: A Case Study in Fingerprints
Abstract. A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a ...
Anil K. Jain, Umut Uludag, Arun Ross