Sciweavers

DBSEC
2010
128views Database» more  DBSEC 2010»
13 years 11 months ago
On the Identification of Property Based Generalizations in Microdata Anonymization
Abstract. Majority of the search algorithms in microdata anonymization restrict themselves to a single privacy property and a single criteria to optimize. The solutions obtained ar...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 11 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
DBSEC
2010
123views Database» more  DBSEC 2010»
13 years 11 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 11 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
SIGMOD
2010
ACM
165views Database» more  SIGMOD 2010»
13 years 11 months ago
Creating and exploring web form repositories
We present DeepPeep (http://www.deeppeep.org), a new system for discovering, organizing and analyzing Web forms. DeepPeep allows users to explore the entry points to hidden-Web si...
Luciano Barbosa, Hoa Nguyen, Thanh Hoang Nguyen, R...
SIGMOD
2010
ACM
158views Database» more  SIGMOD 2010»
13 years 11 months ago
A case for online mixed workload processing
Jens Krüger, Christian Tinnefeld, Martin Grun...
SIGMOD
2010
ACM
154views Database» more  SIGMOD 2010»
13 years 11 months ago
Unbiased estimation of size and other aggregates over hidden web databases
Many websites provide restrictive form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we consider the problem of es...
Arjun Dasgupta, Xin Jin, Bradley Jewell, Nan Zhang...
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
13 years 11 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
SIGMOD
2010
ACM
269views Database» more  SIGMOD 2010»
13 years 11 months ago
MapDupReducer: detecting near duplicates over massive datasets
Categories and Subject Descriptors General Terms Keywords
Chaokun Wang, Jianmin Wang, Xuemin Lin, Wei Wang, ...
SIGMOD
2010
ACM
224views Database» more  SIGMOD 2010»
13 years 11 months ago
GDR: a system for guided data repair
Improving data quality is a time-consuming, labor-intensive and often domain specific operation. Existing data repair approaches are either fully automated or not efficient in int...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...